May 17 00:47:37.129601 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:47:37.131732 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:47:37.131766 kernel: BIOS-provided physical RAM map: May 17 00:47:37.131774 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:47:37.131780 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:47:37.131787 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:47:37.131795 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 17 00:47:37.131803 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 17 00:47:37.131814 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:47:37.131821 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:47:37.131828 kernel: NX (Execute Disable) protection: active May 17 00:47:37.131835 kernel: SMBIOS 2.8 present. May 17 00:47:37.131842 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 17 00:47:37.131849 kernel: Hypervisor detected: KVM May 17 00:47:37.131858 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:47:37.131875 kernel: kvm-clock: cpu 0, msr 1d19a001, primary cpu clock May 17 00:47:37.131886 kernel: kvm-clock: using sched offset of 3885593723 cycles May 17 00:47:37.131899 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:47:37.131912 kernel: tsc: Detected 2494.140 MHz processor May 17 00:47:37.131920 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:47:37.131928 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:47:37.131937 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 17 00:47:37.131945 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:47:37.131959 kernel: ACPI: Early table checksum verification disabled May 17 00:47:37.131968 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 17 00:47:37.131976 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.131984 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.131992 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.131999 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 17 00:47:37.132007 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.132015 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.132023 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.132034 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:47:37.132042 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 17 00:47:37.132050 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 17 00:47:37.132060 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 17 00:47:37.132067 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 17 00:47:37.132075 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 17 00:47:37.132082 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 17 00:47:37.132090 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 17 00:47:37.132106 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:47:37.132115 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:47:37.132128 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:47:37.132142 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:47:37.132156 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 17 00:47:37.132165 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 17 00:47:37.132177 kernel: Zone ranges: May 17 00:47:37.132185 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:47:37.132193 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 17 00:47:37.132202 kernel: Normal empty May 17 00:47:37.132211 kernel: Movable zone start for each node May 17 00:47:37.132223 kernel: Early memory node ranges May 17 00:47:37.132237 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:47:37.132245 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 17 00:47:37.132254 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 17 00:47:37.132266 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:47:37.132278 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:47:37.132292 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 17 00:47:37.132304 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:47:37.132314 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:47:37.132323 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:47:37.132331 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:47:37.132340 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:47:37.132349 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:47:37.132366 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:47:37.132382 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:47:37.132394 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:47:37.132405 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:47:37.132418 kernel: TSC deadline timer available May 17 00:47:37.132431 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:47:37.132445 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 17 00:47:37.132458 kernel: Booting paravirtualized kernel on KVM May 17 00:47:37.132471 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:47:37.132491 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:47:37.132509 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:47:37.132519 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:47:37.132532 kernel: pcpu-alloc: [0] 0 1 May 17 00:47:37.132544 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 17 00:47:37.132558 kernel: kvm-guest: PV spinlocks disabled, no host support May 17 00:47:37.132566 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 17 00:47:37.132575 kernel: Policy zone: DMA32 May 17 00:47:37.132598 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:47:37.132612 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:47:37.132621 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:47:37.132629 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:47:37.132638 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:47:37.132646 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 123076K reserved, 0K cma-reserved) May 17 00:47:37.132654 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:47:37.132663 kernel: Kernel/User page tables isolation: enabled May 17 00:47:37.132671 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:47:37.132683 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:47:37.132691 kernel: rcu: Hierarchical RCU implementation. May 17 00:47:37.132701 kernel: rcu: RCU event tracing is enabled. May 17 00:47:37.132709 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:47:37.132720 kernel: Rude variant of Tasks RCU enabled. May 17 00:47:37.132729 kernel: Tracing variant of Tasks RCU enabled. May 17 00:47:37.132738 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:47:37.132746 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:47:37.132755 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:47:37.132769 kernel: random: crng init done May 17 00:47:37.132782 kernel: Console: colour VGA+ 80x25 May 17 00:47:37.132795 kernel: printk: console [tty0] enabled May 17 00:47:37.132804 kernel: printk: console [ttyS0] enabled May 17 00:47:37.132813 kernel: ACPI: Core revision 20210730 May 17 00:47:37.132821 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:47:37.132830 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:47:37.132839 kernel: x2apic enabled May 17 00:47:37.132849 kernel: Switched APIC routing to physical x2apic. May 17 00:47:37.132862 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:47:37.132876 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 17 00:47:37.132885 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) May 17 00:47:37.132900 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 17 00:47:37.132909 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 17 00:47:37.132921 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:47:37.132933 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:47:37.132947 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:47:37.132961 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 17 00:47:37.132979 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:47:37.133005 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:47:37.133015 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:47:37.133032 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:47:37.133047 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:47:37.133055 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:47:37.133064 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:47:37.133073 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:47:37.133082 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:47:37.133094 kernel: Freeing SMP alternatives memory: 32K May 17 00:47:37.133115 kernel: pid_max: default: 32768 minimum: 301 May 17 00:47:37.133127 kernel: LSM: Security Framework initializing May 17 00:47:37.133141 kernel: SELinux: Initializing. May 17 00:47:37.133150 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:47:37.133159 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:47:37.133168 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 17 00:47:37.133178 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 17 00:47:37.133196 kernel: signal: max sigframe size: 1776 May 17 00:47:37.133209 kernel: rcu: Hierarchical SRCU implementation. May 17 00:47:37.133222 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:47:37.133235 kernel: smp: Bringing up secondary CPUs ... May 17 00:47:37.133248 kernel: x86: Booting SMP configuration: May 17 00:47:37.133262 kernel: .... node #0, CPUs: #1 May 17 00:47:37.133274 kernel: kvm-clock: cpu 1, msr 1d19a041, secondary cpu clock May 17 00:47:37.133287 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 17 00:47:37.133300 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:47:37.133318 kernel: smpboot: Max logical packages: 1 May 17 00:47:37.133330 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) May 17 00:47:37.133344 kernel: devtmpfs: initialized May 17 00:47:37.133358 kernel: x86/mm: Memory block size: 128MB May 17 00:47:37.133371 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:47:37.133385 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:47:37.133398 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:47:37.133412 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:47:37.133425 kernel: audit: initializing netlink subsys (disabled) May 17 00:47:37.133445 kernel: audit: type=2000 audit(1747442855.473:1): state=initialized audit_enabled=0 res=1 May 17 00:47:37.133460 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:47:37.133477 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:47:37.133486 kernel: cpuidle: using governor menu May 17 00:47:37.133496 kernel: ACPI: bus type PCI registered May 17 00:47:37.133505 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:47:37.133520 kernel: dca service started, version 1.12.1 May 17 00:47:37.133529 kernel: PCI: Using configuration type 1 for base access May 17 00:47:37.133539 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:47:37.133559 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:47:37.133570 kernel: ACPI: Added _OSI(Module Device) May 17 00:47:37.133582 kernel: ACPI: Added _OSI(Processor Device) May 17 00:47:37.135306 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:47:37.135326 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:47:37.135340 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:47:37.135355 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:47:37.135371 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:47:37.135385 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:47:37.135411 kernel: ACPI: Interpreter enabled May 17 00:47:37.135423 kernel: ACPI: PM: (supports S0 S5) May 17 00:47:37.135437 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:47:37.135452 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:47:37.135466 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:47:37.135480 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:47:37.135795 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:47:37.135908 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:47:37.135927 kernel: acpiphp: Slot [3] registered May 17 00:47:37.135936 kernel: acpiphp: Slot [4] registered May 17 00:47:37.135945 kernel: acpiphp: Slot [5] registered May 17 00:47:37.135955 kernel: acpiphp: Slot [6] registered May 17 00:47:37.135964 kernel: acpiphp: Slot [7] registered May 17 00:47:37.135973 kernel: acpiphp: Slot [8] registered May 17 00:47:37.135981 kernel: acpiphp: Slot [9] registered May 17 00:47:37.135991 kernel: acpiphp: Slot [10] registered May 17 00:47:37.135999 kernel: acpiphp: Slot [11] registered May 17 00:47:37.136012 kernel: acpiphp: Slot [12] registered May 17 00:47:37.136021 kernel: acpiphp: Slot [13] registered May 17 00:47:37.136030 kernel: acpiphp: Slot [14] registered May 17 00:47:37.136039 kernel: acpiphp: Slot [15] registered May 17 00:47:37.136047 kernel: acpiphp: Slot [16] registered May 17 00:47:37.136056 kernel: acpiphp: Slot [17] registered May 17 00:47:37.136065 kernel: acpiphp: Slot [18] registered May 17 00:47:37.136074 kernel: acpiphp: Slot [19] registered May 17 00:47:37.136082 kernel: acpiphp: Slot [20] registered May 17 00:47:37.136095 kernel: acpiphp: Slot [21] registered May 17 00:47:37.136104 kernel: acpiphp: Slot [22] registered May 17 00:47:37.136113 kernel: acpiphp: Slot [23] registered May 17 00:47:37.136122 kernel: acpiphp: Slot [24] registered May 17 00:47:37.136131 kernel: acpiphp: Slot [25] registered May 17 00:47:37.136140 kernel: acpiphp: Slot [26] registered May 17 00:47:37.136148 kernel: acpiphp: Slot [27] registered May 17 00:47:37.136156 kernel: acpiphp: Slot [28] registered May 17 00:47:37.136165 kernel: acpiphp: Slot [29] registered May 17 00:47:37.136174 kernel: acpiphp: Slot [30] registered May 17 00:47:37.136187 kernel: acpiphp: Slot [31] registered May 17 00:47:37.136196 kernel: PCI host bridge to bus 0000:00 May 17 00:47:37.136317 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:47:37.136419 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:47:37.136535 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:47:37.136639 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:47:37.136726 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 17 00:47:37.136813 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:47:37.136972 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:47:37.137122 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:47:37.137256 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 17 00:47:37.137366 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 17 00:47:37.137466 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:47:37.137581 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:47:37.137727 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:47:37.137821 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:47:37.137948 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 17 00:47:37.138088 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 17 00:47:37.138228 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:47:37.138325 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 17 00:47:37.138428 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 17 00:47:37.138544 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 17 00:47:37.141679 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 17 00:47:37.141841 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 17 00:47:37.141936 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 17 00:47:37.142030 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 17 00:47:37.142134 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:47:37.142260 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 17 00:47:37.142356 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 17 00:47:37.142450 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 17 00:47:37.142545 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 17 00:47:37.142667 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:47:37.142762 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 17 00:47:37.142900 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 17 00:47:37.143044 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 17 00:47:37.143162 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 17 00:47:37.143270 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 17 00:47:37.143418 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 17 00:47:37.143561 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 17 00:47:37.143723 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 17 00:47:37.143836 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:47:37.143928 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 17 00:47:37.144017 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 17 00:47:37.144123 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 17 00:47:37.144213 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 17 00:47:37.144303 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 17 00:47:37.144391 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 17 00:47:37.144499 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 17 00:47:37.144621 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 17 00:47:37.144712 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 17 00:47:37.144723 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:47:37.144733 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:47:37.144742 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:47:37.144751 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:47:37.144765 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:47:37.144774 kernel: iommu: Default domain type: Translated May 17 00:47:37.144783 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:47:37.144883 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 17 00:47:37.144977 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:47:37.145074 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 17 00:47:37.145086 kernel: vgaarb: loaded May 17 00:47:37.145095 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:47:37.145104 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:47:37.145118 kernel: PTP clock support registered May 17 00:47:37.145127 kernel: PCI: Using ACPI for IRQ routing May 17 00:47:37.145145 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:47:37.145154 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:47:37.145163 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 17 00:47:37.145173 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:47:37.145183 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:47:37.145192 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:47:37.145201 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:47:37.145214 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:47:37.145223 kernel: pnp: PnP ACPI init May 17 00:47:37.145232 kernel: pnp: PnP ACPI: found 4 devices May 17 00:47:37.145241 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:47:37.145250 kernel: NET: Registered PF_INET protocol family May 17 00:47:37.145259 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:47:37.145268 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:47:37.145278 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:47:37.145291 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:47:37.145300 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:47:37.145308 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:47:37.145317 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:47:37.145326 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:47:37.145335 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:47:37.145344 kernel: NET: Registered PF_XDP protocol family May 17 00:47:37.145447 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:47:37.145532 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:47:37.145628 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:47:37.145711 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:47:37.145792 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 17 00:47:37.145889 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 17 00:47:37.145998 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:47:37.146095 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:47:37.146108 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:47:37.146209 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 43233 usecs May 17 00:47:37.146227 kernel: PCI: CLS 0 bytes, default 64 May 17 00:47:37.146236 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:47:37.146246 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 17 00:47:37.146255 kernel: Initialise system trusted keyrings May 17 00:47:37.146264 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:47:37.146274 kernel: Key type asymmetric registered May 17 00:47:37.146282 kernel: Asymmetric key parser 'x509' registered May 17 00:47:37.146292 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:47:37.146301 kernel: io scheduler mq-deadline registered May 17 00:47:37.146314 kernel: io scheduler kyber registered May 17 00:47:37.146324 kernel: io scheduler bfq registered May 17 00:47:37.146333 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:47:37.146342 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 17 00:47:37.146351 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:47:37.146360 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:47:37.146369 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:47:37.146379 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:47:37.146389 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:47:37.146403 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:47:37.146412 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:47:37.146422 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:47:37.146616 kernel: rtc_cmos 00:03: RTC can wake from S4 May 17 00:47:37.146727 kernel: rtc_cmos 00:03: registered as rtc0 May 17 00:47:37.146820 kernel: rtc_cmos 00:03: setting system clock to 2025-05-17T00:47:36 UTC (1747442856) May 17 00:47:37.146909 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 17 00:47:37.146925 kernel: intel_pstate: CPU model not supported May 17 00:47:37.146935 kernel: NET: Registered PF_INET6 protocol family May 17 00:47:37.146944 kernel: Segment Routing with IPv6 May 17 00:47:37.146954 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:47:37.146963 kernel: NET: Registered PF_PACKET protocol family May 17 00:47:37.146972 kernel: Key type dns_resolver registered May 17 00:47:37.146982 kernel: IPI shorthand broadcast: enabled May 17 00:47:37.146991 kernel: sched_clock: Marking stable (705379949, 83706493)->(913920764, -124834322) May 17 00:47:37.147000 kernel: registered taskstats version 1 May 17 00:47:37.147009 kernel: Loading compiled-in X.509 certificates May 17 00:47:37.147023 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:47:37.147032 kernel: Key type .fscrypt registered May 17 00:47:37.147041 kernel: Key type fscrypt-provisioning registered May 17 00:47:37.147050 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:47:37.147059 kernel: ima: Allocated hash algorithm: sha1 May 17 00:47:37.147068 kernel: ima: No architecture policies found May 17 00:47:37.147077 kernel: clk: Disabling unused clocks May 17 00:47:37.147086 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:47:37.147098 kernel: Write protecting the kernel read-only data: 28672k May 17 00:47:37.147107 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:47:37.147116 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:47:37.147125 kernel: Run /init as init process May 17 00:47:37.147134 kernel: with arguments: May 17 00:47:37.147144 kernel: /init May 17 00:47:37.147180 kernel: with environment: May 17 00:47:37.147193 kernel: HOME=/ May 17 00:47:37.147202 kernel: TERM=linux May 17 00:47:37.147214 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:47:37.147229 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:47:37.147241 systemd[1]: Detected virtualization kvm. May 17 00:47:37.147251 systemd[1]: Detected architecture x86-64. May 17 00:47:37.147260 systemd[1]: Running in initrd. May 17 00:47:37.147270 systemd[1]: No hostname configured, using default hostname. May 17 00:47:37.147337 systemd[1]: Hostname set to . May 17 00:47:37.147361 systemd[1]: Initializing machine ID from VM UUID. May 17 00:47:37.147375 systemd[1]: Queued start job for default target initrd.target. May 17 00:47:37.147412 systemd[1]: Started systemd-ask-password-console.path. May 17 00:47:37.147422 systemd[1]: Reached target cryptsetup.target. May 17 00:47:37.147432 systemd[1]: Reached target paths.target. May 17 00:47:37.147441 systemd[1]: Reached target slices.target. May 17 00:47:37.147451 systemd[1]: Reached target swap.target. May 17 00:47:37.147460 systemd[1]: Reached target timers.target. May 17 00:47:37.147475 systemd[1]: Listening on iscsid.socket. May 17 00:47:37.147485 systemd[1]: Listening on iscsiuio.socket. May 17 00:47:37.147495 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:47:37.147506 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:47:37.147516 systemd[1]: Listening on systemd-journald.socket. May 17 00:47:37.147526 systemd[1]: Listening on systemd-networkd.socket. May 17 00:47:37.147536 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:47:37.147549 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:47:37.147560 systemd[1]: Reached target sockets.target. May 17 00:47:37.147573 systemd[1]: Starting kmod-static-nodes.service... May 17 00:47:37.147583 systemd[1]: Finished network-cleanup.service. May 17 00:47:37.158697 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:47:37.158710 systemd[1]: Starting systemd-journald.service... May 17 00:47:37.158721 systemd[1]: Starting systemd-modules-load.service... May 17 00:47:37.158742 systemd[1]: Starting systemd-resolved.service... May 17 00:47:37.158752 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:47:37.158762 systemd[1]: Finished kmod-static-nodes.service. May 17 00:47:37.158772 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:47:37.158790 systemd-journald[185]: Journal started May 17 00:47:37.158903 systemd-journald[185]: Runtime Journal (/run/log/journal/8c8b6bd5ddcf4fc98c92e43be0a7b020) is 4.9M, max 39.5M, 34.5M free. May 17 00:47:37.129765 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:47:37.190705 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:47:37.190743 kernel: Bridge firewalling registered May 17 00:47:37.192279 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:47:37.198495 systemd[1]: Started systemd-journald.service. May 17 00:47:37.198533 kernel: audit: type=1130 audit(1747442857.190:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.198551 kernel: audit: type=1130 audit(1747442857.195:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.200274 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:47:37.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.202192 systemd-resolved[187]: Positive Trust Anchors: May 17 00:47:37.216291 kernel: audit: type=1130 audit(1747442857.207:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.202208 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:47:37.224416 kernel: audit: type=1130 audit(1747442857.216:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.224471 kernel: audit: type=1130 audit(1747442857.220:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.202254 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:47:37.207118 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:47:37.211687 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:47:37.213936 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:47:37.217040 systemd[1]: Started systemd-resolved.service. May 17 00:47:37.221249 systemd[1]: Reached target nss-lookup.target. May 17 00:47:37.223189 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:47:37.247630 kernel: SCSI subsystem initialized May 17 00:47:37.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.254974 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:47:37.263299 kernel: audit: type=1130 audit(1747442857.254:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.257621 systemd[1]: Starting dracut-cmdline.service... May 17 00:47:37.269648 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:47:37.269780 kernel: device-mapper: uevent: version 1.0.3 May 17 00:47:37.269804 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:47:37.276693 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:47:37.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.278001 systemd[1]: Finished systemd-modules-load.service. May 17 00:47:37.293388 kernel: audit: type=1130 audit(1747442857.277:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.293443 dracut-cmdline[201]: dracut-dracut-053 May 17 00:47:37.293443 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:47:37.282138 systemd[1]: Starting systemd-sysctl.service... May 17 00:47:37.308396 systemd[1]: Finished systemd-sysctl.service. May 17 00:47:37.311967 kernel: audit: type=1130 audit(1747442857.308:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.399635 kernel: Loading iSCSI transport class v2.0-870. May 17 00:47:37.427626 kernel: iscsi: registered transport (tcp) May 17 00:47:37.463128 kernel: iscsi: registered transport (qla4xxx) May 17 00:47:37.463236 kernel: QLogic iSCSI HBA Driver May 17 00:47:37.512099 systemd[1]: Finished dracut-cmdline.service. May 17 00:47:37.513905 systemd[1]: Starting dracut-pre-udev.service... May 17 00:47:37.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.518646 kernel: audit: type=1130 audit(1747442857.511:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.572699 kernel: raid6: avx2x4 gen() 15909 MB/s May 17 00:47:37.589661 kernel: raid6: avx2x4 xor() 7179 MB/s May 17 00:47:37.606687 kernel: raid6: avx2x2 gen() 16787 MB/s May 17 00:47:37.623660 kernel: raid6: avx2x2 xor() 19485 MB/s May 17 00:47:37.640687 kernel: raid6: avx2x1 gen() 12095 MB/s May 17 00:47:37.657672 kernel: raid6: avx2x1 xor() 15136 MB/s May 17 00:47:37.674653 kernel: raid6: sse2x4 gen() 10623 MB/s May 17 00:47:37.691670 kernel: raid6: sse2x4 xor() 5760 MB/s May 17 00:47:37.708681 kernel: raid6: sse2x2 gen() 8740 MB/s May 17 00:47:37.725698 kernel: raid6: sse2x2 xor() 6603 MB/s May 17 00:47:37.742667 kernel: raid6: sse2x1 gen() 9580 MB/s May 17 00:47:37.760263 kernel: raid6: sse2x1 xor() 5406 MB/s May 17 00:47:37.760372 kernel: raid6: using algorithm avx2x2 gen() 16787 MB/s May 17 00:47:37.760387 kernel: raid6: .... xor() 19485 MB/s, rmw enabled May 17 00:47:37.761242 kernel: raid6: using avx2x2 recovery algorithm May 17 00:47:37.776664 kernel: xor: automatically using best checksumming function avx May 17 00:47:37.893626 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:47:37.906815 systemd[1]: Finished dracut-pre-udev.service. May 17 00:47:37.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.907000 audit: BPF prog-id=7 op=LOAD May 17 00:47:37.907000 audit: BPF prog-id=8 op=LOAD May 17 00:47:37.908381 systemd[1]: Starting systemd-udevd.service... May 17 00:47:37.925512 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:47:37.931494 systemd[1]: Started systemd-udevd.service. May 17 00:47:37.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:37.935777 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:47:37.954186 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation May 17 00:47:38.006482 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:47:38.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.008640 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:47:38.078332 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:47:38.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.149620 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:47:38.174945 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:47:38.175021 kernel: AES CTR mode by8 optimization enabled May 17 00:47:38.175034 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 17 00:47:38.188786 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:47:38.188814 kernel: GPT:9289727 != 125829119 May 17 00:47:38.188827 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:47:38.188838 kernel: GPT:9289727 != 125829119 May 17 00:47:38.188850 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:47:38.188861 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:47:38.191221 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 17 00:47:38.204255 kernel: scsi host0: Virtio SCSI HBA May 17 00:47:38.214622 kernel: ACPI: bus type USB registered May 17 00:47:38.232803 kernel: usbcore: registered new interface driver usbfs May 17 00:47:38.247068 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:47:38.348065 kernel: usbcore: registered new interface driver hub May 17 00:47:38.348126 kernel: usbcore: registered new device driver usb May 17 00:47:38.348146 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (440) May 17 00:47:38.348163 kernel: libata version 3.00 loaded. May 17 00:47:38.348180 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 17 00:47:38.348196 kernel: ehci-pci: EHCI PCI platform driver May 17 00:47:38.348211 kernel: ata_piix 0000:00:01.1: version 2.13 May 17 00:47:38.348527 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 17 00:47:38.348549 kernel: scsi host1: ata_piix May 17 00:47:38.348830 kernel: scsi host2: ata_piix May 17 00:47:38.349037 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 17 00:47:38.349068 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 17 00:47:38.349087 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 17 00:47:38.349280 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 17 00:47:38.349458 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 17 00:47:38.349659 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 17 00:47:38.349844 kernel: hub 1-0:1.0: USB hub found May 17 00:47:38.350114 kernel: hub 1-0:1.0: 2 ports detected May 17 00:47:38.354989 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:47:38.355879 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:47:38.364133 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:47:38.369027 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:47:38.373956 systemd[1]: Starting disk-uuid.service... May 17 00:47:38.382753 disk-uuid[505]: Primary Header is updated. May 17 00:47:38.382753 disk-uuid[505]: Secondary Entries is updated. May 17 00:47:38.382753 disk-uuid[505]: Secondary Header is updated. May 17 00:47:38.402698 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:47:38.412653 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:47:39.418632 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:47:39.419071 disk-uuid[506]: The operation has completed successfully. May 17 00:47:39.480326 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:47:39.481513 systemd[1]: Finished disk-uuid.service. May 17 00:47:39.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.489737 systemd[1]: Starting verity-setup.service... May 17 00:47:39.513666 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:47:39.576972 systemd[1]: Found device dev-mapper-usr.device. May 17 00:47:39.578863 systemd[1]: Mounting sysusr-usr.mount... May 17 00:47:39.581377 systemd[1]: Finished verity-setup.service. May 17 00:47:39.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.678648 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:47:39.680197 systemd[1]: Mounted sysusr-usr.mount. May 17 00:47:39.680785 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:47:39.681968 systemd[1]: Starting ignition-setup.service... May 17 00:47:39.683964 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:47:39.702461 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:47:39.702548 kernel: BTRFS info (device vda6): using free space tree May 17 00:47:39.702562 kernel: BTRFS info (device vda6): has skinny extents May 17 00:47:39.728300 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:47:39.737914 systemd[1]: Finished ignition-setup.service. May 17 00:47:39.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.740334 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:47:39.877561 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:47:39.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.879000 audit: BPF prog-id=9 op=LOAD May 17 00:47:39.881408 systemd[1]: Starting systemd-networkd.service... May 17 00:47:39.922091 systemd-networkd[689]: lo: Link UP May 17 00:47:39.922856 systemd-networkd[689]: lo: Gained carrier May 17 00:47:39.924603 systemd-networkd[689]: Enumeration completed May 17 00:47:39.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.925312 systemd[1]: Started systemd-networkd.service. May 17 00:47:39.925787 systemd[1]: Reached target network.target. May 17 00:47:39.927508 systemd[1]: Starting iscsiuio.service... May 17 00:47:39.930444 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:47:39.932653 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 17 00:47:39.934601 ignition[615]: Ignition 2.14.0 May 17 00:47:39.934638 ignition[615]: Stage: fetch-offline May 17 00:47:39.934756 ignition[615]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:39.934803 ignition[615]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:39.937077 systemd-networkd[689]: eth1: Link UP May 17 00:47:39.937085 systemd-networkd[689]: eth1: Gained carrier May 17 00:47:39.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.942163 ignition[615]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:39.944120 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:47:39.942389 ignition[615]: parsed url from cmdline: "" May 17 00:47:39.945936 systemd[1]: Starting ignition-fetch.service... May 17 00:47:39.942396 ignition[615]: no config URL provided May 17 00:47:39.948960 systemd-networkd[689]: eth0: Link UP May 17 00:47:39.942405 ignition[615]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:47:39.948965 systemd-networkd[689]: eth0: Gained carrier May 17 00:47:39.942421 ignition[615]: no config at "/usr/lib/ignition/user.ign" May 17 00:47:39.942432 ignition[615]: failed to fetch config: resource requires networking May 17 00:47:39.942674 ignition[615]: Ignition finished successfully May 17 00:47:39.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.962747 systemd[1]: Started iscsiuio.service. May 17 00:47:39.964354 systemd[1]: Starting iscsid.service... May 17 00:47:39.974659 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:47:39.974659 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:47:39.974659 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:47:39.974659 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:47:39.974659 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:47:39.974659 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:47:39.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.974699 ignition[693]: Ignition 2.14.0 May 17 00:47:39.978218 systemd[1]: Started iscsid.service. May 17 00:47:39.974713 ignition[693]: Stage: fetch May 17 00:47:39.981373 systemd[1]: Starting dracut-initqueue.service... May 17 00:47:39.975040 ignition[693]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:39.981580 systemd-networkd[689]: eth0: DHCPv4 address 24.199.117.67/20, gateway 24.199.112.1 acquired from 169.254.169.253 May 17 00:47:39.975105 ignition[693]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:39.986780 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.34/20 acquired from 169.254.169.253 May 17 00:47:39.997015 ignition[693]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:39.997157 ignition[693]: parsed url from cmdline: "" May 17 00:47:39.997162 ignition[693]: no config URL provided May 17 00:47:39.997168 ignition[693]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:47:39.997178 ignition[693]: no config at "/usr/lib/ignition/user.ign" May 17 00:47:39.997224 ignition[693]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 17 00:47:40.011710 systemd[1]: Finished dracut-initqueue.service. May 17 00:47:40.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.012335 systemd[1]: Reached target remote-fs-pre.target. May 17 00:47:40.012873 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:47:40.013742 systemd[1]: Reached target remote-fs.target. May 17 00:47:40.016234 systemd[1]: Starting dracut-pre-mount.service... May 17 00:47:40.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.031990 systemd[1]: Finished dracut-pre-mount.service. May 17 00:47:40.036701 ignition[693]: GET result: OK May 17 00:47:40.036857 ignition[693]: parsing config with SHA512: c9444f151fc2fbea853eb7304b7921e0315458d05459045a5376bfc46844a9b979c90d48e77c70457bacf61b39f981b6b364c8fa80b2bb35fd448f30aad87351 May 17 00:47:40.046754 unknown[693]: fetched base config from "system" May 17 00:47:40.046769 unknown[693]: fetched base config from "system" May 17 00:47:40.047315 ignition[693]: fetch: fetch complete May 17 00:47:40.046776 unknown[693]: fetched user config from "digitalocean" May 17 00:47:40.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.047324 ignition[693]: fetch: fetch passed May 17 00:47:40.049370 systemd[1]: Finished ignition-fetch.service. May 17 00:47:40.047386 ignition[693]: Ignition finished successfully May 17 00:47:40.051886 systemd[1]: Starting ignition-kargs.service... May 17 00:47:40.063697 ignition[714]: Ignition 2.14.0 May 17 00:47:40.063713 ignition[714]: Stage: kargs May 17 00:47:40.063902 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:40.063923 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:40.065874 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:40.067100 ignition[714]: kargs: kargs passed May 17 00:47:40.067169 ignition[714]: Ignition finished successfully May 17 00:47:40.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.068539 systemd[1]: Finished ignition-kargs.service. May 17 00:47:40.071097 systemd[1]: Starting ignition-disks.service... May 17 00:47:40.084039 ignition[720]: Ignition 2.14.0 May 17 00:47:40.084884 ignition[720]: Stage: disks May 17 00:47:40.085403 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:40.086030 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:40.088215 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:40.090934 ignition[720]: disks: disks passed May 17 00:47:40.091718 ignition[720]: Ignition finished successfully May 17 00:47:40.093786 systemd[1]: Finished ignition-disks.service. May 17 00:47:40.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.094383 systemd[1]: Reached target initrd-root-device.target. May 17 00:47:40.094911 systemd[1]: Reached target local-fs-pre.target. May 17 00:47:40.095862 systemd[1]: Reached target local-fs.target. May 17 00:47:40.096613 systemd[1]: Reached target sysinit.target. May 17 00:47:40.097248 systemd[1]: Reached target basic.target. May 17 00:47:40.099273 systemd[1]: Starting systemd-fsck-root.service... May 17 00:47:40.122143 systemd-fsck[728]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:47:40.126302 systemd[1]: Finished systemd-fsck-root.service. May 17 00:47:40.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.128272 systemd[1]: Mounting sysroot.mount... May 17 00:47:40.143617 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:47:40.144862 systemd[1]: Mounted sysroot.mount. May 17 00:47:40.145631 systemd[1]: Reached target initrd-root-fs.target. May 17 00:47:40.148709 systemd[1]: Mounting sysroot-usr.mount... May 17 00:47:40.150900 systemd[1]: Starting flatcar-digitalocean-network.service... May 17 00:47:40.153952 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:47:40.154623 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:47:40.154716 systemd[1]: Reached target ignition-diskful.target. May 17 00:47:40.158230 systemd[1]: Mounted sysroot-usr.mount. May 17 00:47:40.160209 systemd[1]: Starting initrd-setup-root.service... May 17 00:47:40.170019 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:47:40.183229 initrd-setup-root[748]: cut: /sysroot/etc/group: No such file or directory May 17 00:47:40.194999 initrd-setup-root[756]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:47:40.205114 initrd-setup-root[764]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:47:40.298937 coreos-metadata[735]: May 17 00:47:40.298 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:47:40.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.301532 systemd[1]: Finished initrd-setup-root.service. May 17 00:47:40.303467 systemd[1]: Starting ignition-mount.service... May 17 00:47:40.309728 systemd[1]: Starting sysroot-boot.service... May 17 00:47:40.318940 coreos-metadata[735]: May 17 00:47:40.318 INFO Fetch successful May 17 00:47:40.328153 bash[786]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:47:40.332539 coreos-metadata[735]: May 17 00:47:40.332 INFO wrote hostname ci-3510.3.7-n-f656071047 to /sysroot/etc/hostname May 17 00:47:40.337091 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:47:40.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.346052 coreos-metadata[734]: May 17 00:47:40.345 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:47:40.355135 ignition[787]: INFO : Ignition 2.14.0 May 17 00:47:40.356264 ignition[787]: INFO : Stage: mount May 17 00:47:40.357199 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:40.357199 ignition[787]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:40.360208 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:40.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.360026 systemd[1]: Finished sysroot-boot.service. May 17 00:47:40.364034 ignition[787]: INFO : mount: mount passed May 17 00:47:40.364829 ignition[787]: INFO : Ignition finished successfully May 17 00:47:40.365464 systemd[1]: Finished ignition-mount.service. May 17 00:47:40.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.367934 coreos-metadata[734]: May 17 00:47:40.367 INFO Fetch successful May 17 00:47:40.377145 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 17 00:47:40.377328 systemd[1]: Finished flatcar-digitalocean-network.service. May 17 00:47:40.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:40.602946 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:47:40.613652 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (795) May 17 00:47:40.616695 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:47:40.616787 kernel: BTRFS info (device vda6): using free space tree May 17 00:47:40.616801 kernel: BTRFS info (device vda6): has skinny extents May 17 00:47:40.624229 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:47:40.633299 systemd[1]: Starting ignition-files.service... May 17 00:47:40.658127 ignition[815]: INFO : Ignition 2.14.0 May 17 00:47:40.658127 ignition[815]: INFO : Stage: files May 17 00:47:40.659483 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:40.659483 ignition[815]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:40.660884 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:40.665775 ignition[815]: DEBUG : files: compiled without relabeling support, skipping May 17 00:47:40.668493 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:47:40.669331 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:47:40.673910 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:47:40.675018 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:47:40.677510 unknown[815]: wrote ssh authorized keys file for user: core May 17 00:47:40.678391 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:47:40.679959 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:47:40.680996 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 17 00:47:40.725051 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:47:40.855940 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:47:40.855940 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:47:40.857927 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:47:41.572943 systemd-networkd[689]: eth1: Gained IPv6LL May 17 00:47:41.574705 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 00:47:41.830191 systemd-networkd[689]: eth0: Gained IPv6LL May 17 00:47:41.967015 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:47:41.968709 ignition[815]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:47:41.969570 ignition[815]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:47:41.970454 ignition[815]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 17 00:47:41.971708 ignition[815]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:47:41.975834 ignition[815]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:47:41.975834 ignition[815]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 17 00:47:41.975834 ignition[815]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:47:41.975834 ignition[815]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:47:41.975834 ignition[815]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 17 00:47:41.975834 ignition[815]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:47:41.980748 ignition[815]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:47:41.981466 ignition[815]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:47:41.981466 ignition[815]: INFO : files: files passed May 17 00:47:41.981466 ignition[815]: INFO : Ignition finished successfully May 17 00:47:41.985875 systemd[1]: Finished ignition-files.service. May 17 00:47:41.995904 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:47:41.996290 kernel: audit: type=1130 audit(1747442861.985:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.989644 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:47:42.002697 kernel: audit: type=1130 audit(1747442861.998:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.002779 kernel: audit: type=1131 audit(1747442861.998:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.991050 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:47:41.992562 systemd[1]: Starting ignition-quench.service... May 17 00:47:41.997972 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:47:41.998162 systemd[1]: Finished ignition-quench.service. May 17 00:47:42.007691 initrd-setup-root-after-ignition[840]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:47:42.008040 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:47:42.012842 kernel: audit: type=1130 audit(1747442862.008:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.009161 systemd[1]: Reached target ignition-complete.target. May 17 00:47:42.014937 systemd[1]: Starting initrd-parse-etc.service... May 17 00:47:42.040769 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:47:42.040994 systemd[1]: Finished initrd-parse-etc.service. May 17 00:47:42.046862 kernel: audit: type=1130 audit(1747442862.041:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.046915 kernel: audit: type=1131 audit(1747442862.041:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.042396 systemd[1]: Reached target initrd-fs.target. May 17 00:47:42.049828 systemd[1]: Reached target initrd.target. May 17 00:47:42.051550 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:47:42.053460 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:47:42.072968 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:47:42.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.076634 kernel: audit: type=1130 audit(1747442862.073:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.077747 systemd[1]: Starting initrd-cleanup.service... May 17 00:47:42.090946 systemd[1]: Stopped target nss-lookup.target. May 17 00:47:42.092123 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:47:42.093118 systemd[1]: Stopped target timers.target. May 17 00:47:42.094018 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:47:42.094667 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:47:42.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.095778 systemd[1]: Stopped target initrd.target. May 17 00:47:42.098995 kernel: audit: type=1131 audit(1747442862.094:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.099566 systemd[1]: Stopped target basic.target. May 17 00:47:42.100176 systemd[1]: Stopped target ignition-complete.target. May 17 00:47:42.101100 systemd[1]: Stopped target ignition-diskful.target. May 17 00:47:42.102065 systemd[1]: Stopped target initrd-root-device.target. May 17 00:47:42.112146 systemd[1]: Stopped target remote-fs.target. May 17 00:47:42.113073 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:47:42.113916 systemd[1]: Stopped target sysinit.target. May 17 00:47:42.114751 systemd[1]: Stopped target local-fs.target. May 17 00:47:42.115624 systemd[1]: Stopped target local-fs-pre.target. May 17 00:47:42.116385 systemd[1]: Stopped target swap.target. May 17 00:47:42.117111 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:47:42.120892 kernel: audit: type=1131 audit(1747442862.117:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.117332 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:47:42.118112 systemd[1]: Stopped target cryptsetup.target. May 17 00:47:42.121437 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:47:42.125981 kernel: audit: type=1131 audit(1747442862.122:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.121705 systemd[1]: Stopped dracut-initqueue.service. May 17 00:47:42.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.122952 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:47:42.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.123146 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:47:42.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.126640 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:47:42.126824 systemd[1]: Stopped ignition-files.service. May 17 00:47:42.127581 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:47:42.127797 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:47:42.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.129954 systemd[1]: Stopping ignition-mount.service... May 17 00:47:42.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.148040 iscsid[699]: iscsid shutting down. May 17 00:47:42.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.131226 systemd[1]: Stopping iscsid.service... May 17 00:47:42.131715 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:47:42.131913 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:47:42.134519 systemd[1]: Stopping sysroot-boot.service... May 17 00:47:42.135143 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:47:42.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.164678 ignition[853]: INFO : Ignition 2.14.0 May 17 00:47:42.164678 ignition[853]: INFO : Stage: umount May 17 00:47:42.164678 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:47:42.164678 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:47:42.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.138176 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:47:42.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.147509 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:47:42.174331 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:47:42.147946 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:47:42.155736 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:47:42.155919 systemd[1]: Stopped iscsid.service. May 17 00:47:42.178147 ignition[853]: INFO : umount: umount passed May 17 00:47:42.178147 ignition[853]: INFO : Ignition finished successfully May 17 00:47:42.160085 systemd[1]: Stopping iscsiuio.service... May 17 00:47:42.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.165102 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:47:42.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.165273 systemd[1]: Stopped iscsiuio.service. May 17 00:47:42.170626 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:47:42.171442 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:47:42.171576 systemd[1]: Finished initrd-cleanup.service. May 17 00:47:42.177396 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:47:42.177539 systemd[1]: Stopped ignition-mount.service. May 17 00:47:42.181291 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:47:42.181383 systemd[1]: Stopped ignition-disks.service. May 17 00:47:42.182886 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:47:42.182964 systemd[1]: Stopped ignition-kargs.service. May 17 00:47:42.183561 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:47:42.183638 systemd[1]: Stopped ignition-fetch.service. May 17 00:47:42.184094 systemd[1]: Stopped target network.target. May 17 00:47:42.184435 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:47:42.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.184512 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:47:42.184964 systemd[1]: Stopped target paths.target. May 17 00:47:42.185876 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:47:42.189754 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:47:42.190816 systemd[1]: Stopped target slices.target. May 17 00:47:42.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.191730 systemd[1]: Stopped target sockets.target. May 17 00:47:42.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.192605 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:47:42.192690 systemd[1]: Closed iscsid.socket. May 17 00:47:42.193421 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:47:42.193483 systemd[1]: Closed iscsiuio.socket. May 17 00:47:42.194194 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:47:42.194277 systemd[1]: Stopped ignition-setup.service. May 17 00:47:42.195715 systemd[1]: Stopping systemd-networkd.service... May 17 00:47:42.196420 systemd[1]: Stopping systemd-resolved.service... May 17 00:47:42.197472 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:47:42.198146 systemd[1]: Stopped sysroot-boot.service. May 17 00:47:42.198822 systemd-networkd[689]: eth0: DHCPv6 lease lost May 17 00:47:42.199705 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:47:42.199788 systemd[1]: Stopped initrd-setup-root.service. May 17 00:47:42.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.203494 systemd-networkd[689]: eth1: DHCPv6 lease lost May 17 00:47:42.205550 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:47:42.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.205759 systemd[1]: Stopped systemd-resolved.service. May 17 00:47:42.209000 audit: BPF prog-id=6 op=UNLOAD May 17 00:47:42.208036 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:47:42.210000 audit: BPF prog-id=9 op=UNLOAD May 17 00:47:42.208215 systemd[1]: Stopped systemd-networkd.service. May 17 00:47:42.209794 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:47:42.209854 systemd[1]: Closed systemd-networkd.socket. May 17 00:47:42.212018 systemd[1]: Stopping network-cleanup.service... May 17 00:47:42.215034 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:47:42.215159 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:47:42.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.216321 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:47:42.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.216416 systemd[1]: Stopped systemd-sysctl.service. May 17 00:47:42.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.217262 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:47:42.217333 systemd[1]: Stopped systemd-modules-load.service. May 17 00:47:42.223919 systemd[1]: Stopping systemd-udevd.service... May 17 00:47:42.226272 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:47:42.230560 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:47:42.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.230711 systemd[1]: Stopped network-cleanup.service. May 17 00:47:42.233167 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:47:42.234121 systemd[1]: Stopped systemd-udevd.service. May 17 00:47:42.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.235979 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:47:42.236853 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:47:42.237995 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:47:42.238766 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:47:42.239663 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:47:42.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.239770 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:47:42.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.240582 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:47:42.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.240683 systemd[1]: Stopped dracut-cmdline.service. May 17 00:47:42.241530 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:47:42.241608 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:47:42.243868 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:47:42.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.244642 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:47:42.244768 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:47:42.261629 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:47:42.261808 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:47:42.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:42.263001 systemd[1]: Reached target initrd-switch-root.target. May 17 00:47:42.264907 systemd[1]: Starting initrd-switch-root.service... May 17 00:47:42.279779 systemd[1]: Switching root. May 17 00:47:42.302370 systemd-journald[185]: Journal stopped May 17 00:47:46.493753 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:47:46.493851 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:47:46.493873 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:47:46.493885 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:47:46.493897 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:47:46.493909 kernel: SELinux: policy capability open_perms=1 May 17 00:47:46.493931 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:47:46.493942 kernel: SELinux: policy capability always_check_network=0 May 17 00:47:46.493954 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:47:46.493967 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:47:46.493978 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:47:46.493990 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:47:46.494001 systemd[1]: Successfully loaded SELinux policy in 56.450ms. May 17 00:47:46.494028 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.494ms. May 17 00:47:46.494046 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:47:46.494058 systemd[1]: Detected virtualization kvm. May 17 00:47:46.494072 systemd[1]: Detected architecture x86-64. May 17 00:47:46.494083 systemd[1]: Detected first boot. May 17 00:47:46.494095 systemd[1]: Hostname set to . May 17 00:47:46.494108 systemd[1]: Initializing machine ID from VM UUID. May 17 00:47:46.494121 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:47:46.494133 systemd[1]: Populated /etc with preset unit settings. May 17 00:47:46.494150 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:47:46.494164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:47:46.494178 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:47:46.494191 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:47:46.494204 systemd[1]: Stopped initrd-switch-root.service. May 17 00:47:46.494217 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:47:46.494229 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:47:46.494242 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:47:46.494275 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:47:46.494288 systemd[1]: Created slice system-getty.slice. May 17 00:47:46.494301 systemd[1]: Created slice system-modprobe.slice. May 17 00:47:46.494314 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:47:46.494325 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:47:46.494337 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:47:46.494349 systemd[1]: Created slice user.slice. May 17 00:47:46.494361 systemd[1]: Started systemd-ask-password-console.path. May 17 00:47:46.494373 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:47:46.494389 systemd[1]: Set up automount boot.automount. May 17 00:47:46.494401 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:47:46.494414 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:47:46.494426 systemd[1]: Stopped target initrd-fs.target. May 17 00:47:46.494441 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:47:46.494464 systemd[1]: Reached target integritysetup.target. May 17 00:47:46.494486 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:47:46.494504 systemd[1]: Reached target remote-fs.target. May 17 00:47:46.494522 systemd[1]: Reached target slices.target. May 17 00:47:46.494539 systemd[1]: Reached target swap.target. May 17 00:47:46.494556 systemd[1]: Reached target torcx.target. May 17 00:47:46.494574 systemd[1]: Reached target veritysetup.target. May 17 00:47:46.494613 systemd[1]: Listening on systemd-coredump.socket. May 17 00:47:46.494632 systemd[1]: Listening on systemd-initctl.socket. May 17 00:47:46.494645 systemd[1]: Listening on systemd-networkd.socket. May 17 00:47:46.494657 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:47:46.494673 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:47:46.494686 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:47:46.494698 systemd[1]: Mounting dev-hugepages.mount... May 17 00:47:46.494710 systemd[1]: Mounting dev-mqueue.mount... May 17 00:47:46.494723 systemd[1]: Mounting media.mount... May 17 00:47:46.494735 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:46.494747 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:47:46.494759 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:47:46.494771 systemd[1]: Mounting tmp.mount... May 17 00:47:46.494787 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:47:46.494799 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:46.494811 systemd[1]: Starting kmod-static-nodes.service... May 17 00:47:46.494824 systemd[1]: Starting modprobe@configfs.service... May 17 00:47:46.494836 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:47:46.494849 systemd[1]: Starting modprobe@drm.service... May 17 00:47:46.494866 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:47:46.494884 systemd[1]: Starting modprobe@fuse.service... May 17 00:47:46.494911 systemd[1]: Starting modprobe@loop.service... May 17 00:47:46.494943 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:47:46.494962 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:47:46.494981 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:47:46.494997 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:47:46.495010 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:47:46.495021 systemd[1]: Stopped systemd-journald.service. May 17 00:47:46.495034 systemd[1]: Starting systemd-journald.service... May 17 00:47:46.495047 systemd[1]: Starting systemd-modules-load.service... May 17 00:47:46.495059 systemd[1]: Starting systemd-network-generator.service... May 17 00:47:46.495074 systemd[1]: Starting systemd-remount-fs.service... May 17 00:47:46.495086 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:47:46.495098 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:47:46.495111 systemd[1]: Stopped verity-setup.service. May 17 00:47:46.495123 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:46.495135 systemd[1]: Mounted dev-hugepages.mount. May 17 00:47:46.495148 systemd[1]: Mounted dev-mqueue.mount. May 17 00:47:46.495159 systemd[1]: Mounted media.mount. May 17 00:47:46.495171 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:47:46.495187 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:47:46.495199 systemd[1]: Mounted tmp.mount. May 17 00:47:46.495219 systemd[1]: Finished kmod-static-nodes.service. May 17 00:47:46.495231 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:47:46.495243 systemd[1]: Finished modprobe@configfs.service. May 17 00:47:46.495256 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:47:46.495268 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:47:46.495282 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:47:46.495297 kernel: fuse: init (API version 7.34) May 17 00:47:46.495397 systemd[1]: Finished modprobe@drm.service. May 17 00:47:46.495418 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:47:46.495434 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:47:46.495446 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:47:46.495458 systemd[1]: Finished modprobe@fuse.service. May 17 00:47:46.495474 systemd[1]: Finished systemd-modules-load.service. May 17 00:47:46.495487 systemd[1]: Finished systemd-network-generator.service. May 17 00:47:46.495499 systemd[1]: Finished systemd-remount-fs.service. May 17 00:47:46.495511 systemd[1]: Reached target network-pre.target. May 17 00:47:46.495523 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:47:46.495535 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:47:46.495548 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:47:46.495560 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:47:46.495573 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:47:46.495691 systemd[1]: Starting systemd-random-seed.service... May 17 00:47:46.495705 systemd[1]: Starting systemd-sysctl.service... May 17 00:47:46.495717 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:47:46.495730 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:47:46.495749 systemd[1]: Finished systemd-random-seed.service. May 17 00:47:46.495762 kernel: loop: module loaded May 17 00:47:46.495777 systemd[1]: Reached target first-boot-complete.target. May 17 00:47:46.495798 systemd-journald[958]: Journal started May 17 00:47:46.495878 systemd-journald[958]: Runtime Journal (/run/log/journal/8c8b6bd5ddcf4fc98c92e43be0a7b020) is 4.9M, max 39.5M, 34.5M free. May 17 00:47:42.481000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:47:46.501968 systemd[1]: Started systemd-journald.service. May 17 00:47:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:47:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:47:42.548000 audit: BPF prog-id=10 op=LOAD May 17 00:47:42.548000 audit: BPF prog-id=10 op=UNLOAD May 17 00:47:42.548000 audit: BPF prog-id=11 op=LOAD May 17 00:47:42.548000 audit: BPF prog-id=11 op=UNLOAD May 17 00:47:42.671000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:47:42.671000 audit[885]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:42.671000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:47:42.674000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:47:42.674000 audit[885]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:42.674000 audit: CWD cwd="/" May 17 00:47:42.674000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:42.674000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:42.674000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:47:46.186000 audit: BPF prog-id=12 op=LOAD May 17 00:47:46.187000 audit: BPF prog-id=3 op=UNLOAD May 17 00:47:46.187000 audit: BPF prog-id=13 op=LOAD May 17 00:47:46.187000 audit: BPF prog-id=14 op=LOAD May 17 00:47:46.187000 audit: BPF prog-id=4 op=UNLOAD May 17 00:47:46.187000 audit: BPF prog-id=5 op=UNLOAD May 17 00:47:46.188000 audit: BPF prog-id=15 op=LOAD May 17 00:47:46.188000 audit: BPF prog-id=12 op=UNLOAD May 17 00:47:46.188000 audit: BPF prog-id=16 op=LOAD May 17 00:47:46.188000 audit: BPF prog-id=17 op=LOAD May 17 00:47:46.188000 audit: BPF prog-id=13 op=UNLOAD May 17 00:47:46.188000 audit: BPF prog-id=14 op=UNLOAD May 17 00:47:46.189000 audit: BPF prog-id=18 op=LOAD May 17 00:47:46.189000 audit: BPF prog-id=15 op=UNLOAD May 17 00:47:46.189000 audit: BPF prog-id=19 op=LOAD May 17 00:47:46.189000 audit: BPF prog-id=20 op=LOAD May 17 00:47:46.189000 audit: BPF prog-id=16 op=UNLOAD May 17 00:47:46.189000 audit: BPF prog-id=17 op=UNLOAD May 17 00:47:46.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.197000 audit: BPF prog-id=18 op=UNLOAD May 17 00:47:46.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.345000 audit: BPF prog-id=21 op=LOAD May 17 00:47:46.345000 audit: BPF prog-id=22 op=LOAD May 17 00:47:46.345000 audit: BPF prog-id=23 op=LOAD May 17 00:47:46.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.410000 audit: BPF prog-id=20 op=UNLOAD May 17 00:47:46.410000 audit: BPF prog-id=19 op=UNLOAD May 17 00:47:46.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.489000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:47:46.489000 audit[958]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe894fcf10 a2=4000 a3=7ffe894fcfac items=0 ppid=1 pid=958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:46.489000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:47:46.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.184306 systemd[1]: Queued start job for default target multi-user.target. May 17 00:47:42.667967 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:47:46.184335 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:47:42.668664 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:47:46.190816 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:47:42.668695 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:47:46.497851 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:47:42.668745 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:47:46.498060 systemd[1]: Finished modprobe@loop.service. May 17 00:47:42.668761 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:47:46.500296 systemd[1]: Starting systemd-journal-flush.service... May 17 00:47:42.668821 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:47:46.500861 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:47:42.668842 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:47:42.669152 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:47:42.669223 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:47:42.669247 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:47:42.671407 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:47:42.671472 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:47:42.671505 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:47:42.671528 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:47:42.671560 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:47:42.671582 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:47:45.637259 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:47:45.637701 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:47:45.637866 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:47:45.638181 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:47:45.638266 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:47:45.638390 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-17T00:47:45Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:47:46.526775 systemd-journald[958]: Time spent on flushing to /var/log/journal/8c8b6bd5ddcf4fc98c92e43be0a7b020 is 49.833ms for 1153 entries. May 17 00:47:46.526775 systemd-journald[958]: System Journal (/var/log/journal/8c8b6bd5ddcf4fc98c92e43be0a7b020) is 8.0M, max 195.6M, 187.6M free. May 17 00:47:46.587922 systemd-journald[958]: Received client request to flush runtime journal. May 17 00:47:46.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.533542 systemd[1]: Finished systemd-sysctl.service. May 17 00:47:46.545446 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:47:46.548029 systemd[1]: Starting systemd-sysusers.service... May 17 00:47:46.589855 systemd[1]: Finished systemd-journal-flush.service. May 17 00:47:46.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.593896 systemd[1]: Finished systemd-sysusers.service. May 17 00:47:46.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:46.614318 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:47:46.616649 systemd[1]: Starting systemd-udev-settle.service... May 17 00:47:46.631191 udevadm[994]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:47:47.296670 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:47:47.301930 kernel: kauditd_printk_skb: 107 callbacks suppressed May 17 00:47:47.302331 kernel: audit: type=1130 audit(1747442867.296:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.306878 kernel: audit: type=1334 audit(1747442867.297:148): prog-id=24 op=LOAD May 17 00:47:47.307031 kernel: audit: type=1334 audit(1747442867.301:149): prog-id=25 op=LOAD May 17 00:47:47.297000 audit: BPF prog-id=24 op=LOAD May 17 00:47:47.301000 audit: BPF prog-id=25 op=LOAD May 17 00:47:47.301000 audit: BPF prog-id=7 op=UNLOAD May 17 00:47:47.304239 systemd[1]: Starting systemd-udevd.service... May 17 00:47:47.308398 kernel: audit: type=1334 audit(1747442867.301:150): prog-id=7 op=UNLOAD May 17 00:47:47.308993 kernel: audit: type=1334 audit(1747442867.301:151): prog-id=8 op=UNLOAD May 17 00:47:47.301000 audit: BPF prog-id=8 op=UNLOAD May 17 00:47:47.337896 systemd-udevd[995]: Using default interface naming scheme 'v252'. May 17 00:47:47.371782 systemd[1]: Started systemd-udevd.service. May 17 00:47:47.393360 kernel: audit: type=1130 audit(1747442867.371:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.393486 kernel: audit: type=1334 audit(1747442867.373:153): prog-id=26 op=LOAD May 17 00:47:47.393508 kernel: audit: type=1334 audit(1747442867.384:154): prog-id=27 op=LOAD May 17 00:47:47.393614 kernel: audit: type=1334 audit(1747442867.384:155): prog-id=28 op=LOAD May 17 00:47:47.393635 kernel: audit: type=1334 audit(1747442867.384:156): prog-id=29 op=LOAD May 17 00:47:47.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.373000 audit: BPF prog-id=26 op=LOAD May 17 00:47:47.384000 audit: BPF prog-id=27 op=LOAD May 17 00:47:47.384000 audit: BPF prog-id=28 op=LOAD May 17 00:47:47.384000 audit: BPF prog-id=29 op=LOAD May 17 00:47:47.381303 systemd[1]: Starting systemd-networkd.service... May 17 00:47:47.389317 systemd[1]: Starting systemd-userdbd.service... May 17 00:47:47.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.445459 systemd[1]: Started systemd-userdbd.service. May 17 00:47:47.516382 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:47.516741 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:47.518953 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:47:47.523900 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:47:47.527271 systemd[1]: Starting modprobe@loop.service... May 17 00:47:47.527893 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:47:47.528015 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:47:47.528185 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:47.529136 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:47:47.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.529360 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:47:47.532286 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:47:47.532492 systemd[1]: Finished modprobe@loop.service. May 17 00:47:47.533533 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:47:47.533845 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:47:47.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.537550 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:47:47.537796 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:47:47.538512 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:47:47.563767 systemd-networkd[1002]: lo: Link UP May 17 00:47:47.563778 systemd-networkd[1002]: lo: Gained carrier May 17 00:47:47.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.564315 systemd-networkd[1002]: Enumeration completed May 17 00:47:47.564416 systemd-networkd[1002]: eth1: Configuring with /run/systemd/network/10-06:fc:94:9b:7e:2a.network. May 17 00:47:47.564486 systemd[1]: Started systemd-networkd.service. May 17 00:47:47.568260 systemd-networkd[1002]: eth1: Link UP May 17 00:47:47.568271 systemd-networkd[1002]: eth1: Gained carrier May 17 00:47:47.630000 audit[999]: AVC avc: denied { confidentiality } for pid=999 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:47:47.630000 audit[999]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a91b23030 a1=338ac a2=7f48ca82dbc5 a3=5 items=110 ppid=995 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:47.630000 audit: CWD cwd="/" May 17 00:47:47.630000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=1 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=2 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=3 name=(null) inode=14372 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=4 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=5 name=(null) inode=14373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=6 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=7 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=8 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=9 name=(null) inode=14375 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=10 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=11 name=(null) inode=14376 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=12 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=13 name=(null) inode=14377 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=14 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=15 name=(null) inode=14378 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=16 name=(null) inode=14374 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=17 name=(null) inode=14379 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=18 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=19 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=20 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=21 name=(null) inode=14381 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=22 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=23 name=(null) inode=14382 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=24 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=25 name=(null) inode=14383 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=26 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=27 name=(null) inode=14384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=28 name=(null) inode=14380 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=29 name=(null) inode=14385 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=30 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=31 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=32 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=33 name=(null) inode=14387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=34 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=35 name=(null) inode=14388 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=36 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=37 name=(null) inode=14389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=38 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=39 name=(null) inode=14390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=40 name=(null) inode=14386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=41 name=(null) inode=14391 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=42 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=43 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=44 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=45 name=(null) inode=14393 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=46 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=47 name=(null) inode=14394 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=48 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=49 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=50 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=51 name=(null) inode=14396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=52 name=(null) inode=14392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=53 name=(null) inode=14397 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=55 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=56 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=57 name=(null) inode=14399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=58 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=59 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=60 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=61 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=62 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=63 name=(null) inode=14402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=64 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=65 name=(null) inode=14403 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=66 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=67 name=(null) inode=14404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=68 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=69 name=(null) inode=14405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=70 name=(null) inode=14401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=71 name=(null) inode=14406 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=72 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=73 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=74 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=75 name=(null) inode=14408 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=76 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=77 name=(null) inode=14409 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=78 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=79 name=(null) inode=14410 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=80 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=81 name=(null) inode=14411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=82 name=(null) inode=14407 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=83 name=(null) inode=14412 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=84 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=85 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=86 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=87 name=(null) inode=14414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=88 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=89 name=(null) inode=14415 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=90 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=91 name=(null) inode=14416 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=92 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=93 name=(null) inode=14417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=94 name=(null) inode=14413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=95 name=(null) inode=14418 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=96 name=(null) inode=14398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=97 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=98 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=99 name=(null) inode=14420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=100 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=101 name=(null) inode=14421 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=102 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=103 name=(null) inode=14422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=104 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=105 name=(null) inode=14423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=106 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=107 name=(null) inode=14424 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PATH item=109 name=(null) inode=14425 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:47:47.630000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:47:47.669634 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 17 00:47:47.673052 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input2 May 17 00:47:47.681646 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 May 17 00:47:47.690634 kernel: ACPI: button: Power Button [PWRF] May 17 00:47:47.704868 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:47:47.729636 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:47:47.761203 systemd-networkd[1002]: eth0: Configuring with /run/systemd/network/10-be:40:c7:b4:fb:64.network. May 17 00:47:47.761952 systemd-networkd[1002]: eth0: Link UP May 17 00:47:47.761964 systemd-networkd[1002]: eth0: Gained carrier May 17 00:47:47.869627 kernel: EDAC MC: Ver: 3.0.0 May 17 00:47:47.898360 systemd[1]: Finished systemd-udev-settle.service. May 17 00:47:47.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.900955 systemd[1]: Starting lvm2-activation-early.service... May 17 00:47:47.924702 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:47:47.960032 systemd[1]: Finished lvm2-activation-early.service. May 17 00:47:47.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:47.960715 systemd[1]: Reached target cryptsetup.target. May 17 00:47:47.962913 systemd[1]: Starting lvm2-activation.service... May 17 00:47:47.971887 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:47:48.003870 systemd[1]: Finished lvm2-activation.service. May 17 00:47:48.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.004728 systemd[1]: Reached target local-fs-pre.target. May 17 00:47:48.008141 systemd[1]: Mounting media-configdrive.mount... May 17 00:47:48.008774 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:47:48.008854 systemd[1]: Reached target machines.target. May 17 00:47:48.011364 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:47:48.029724 kernel: ISO 9660 Extensions: RRIP_1991A May 17 00:47:48.032464 systemd[1]: Mounted media-configdrive.mount. May 17 00:47:48.033189 systemd[1]: Reached target local-fs.target. May 17 00:47:48.036032 systemd[1]: Starting ldconfig.service... May 17 00:47:48.037283 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:47:48.037412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:48.039661 systemd[1]: Starting systemd-boot-update.service... May 17 00:47:48.044404 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:47:48.052158 systemd[1]: Starting systemd-sysext.service... May 17 00:47:48.053696 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:47:48.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.062390 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1040 (bootctl) May 17 00:47:48.064786 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:47:48.080990 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:47:48.095756 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:47:48.096102 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:47:48.107183 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:47:48.108907 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:47:48.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.125649 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:47:48.165630 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:47:48.176577 systemd-fsck[1047]: fsck.fat 4.2 (2021-01-31) May 17 00:47:48.176577 systemd-fsck[1047]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:47:48.185686 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:47:48.187059 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:47:48.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.190048 systemd[1]: Mounting boot.mount... May 17 00:47:48.218867 systemd[1]: Mounted boot.mount. May 17 00:47:48.224814 (sd-sysext)[1050]: Using extensions 'kubernetes'. May 17 00:47:48.227010 (sd-sysext)[1050]: Merged extensions into '/usr'. May 17 00:47:48.261617 systemd[1]: Finished systemd-boot-update.service. May 17 00:47:48.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.263111 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:48.267179 systemd[1]: Mounting usr-share-oem.mount... May 17 00:47:48.268076 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:48.271112 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:47:48.274159 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:47:48.277492 systemd[1]: Starting modprobe@loop.service... May 17 00:47:48.278277 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:47:48.278539 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:48.278724 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:48.280429 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:47:48.280699 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:47:48.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.282293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:47:48.282639 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:47:48.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.284144 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:47:48.288974 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:47:48.289208 systemd[1]: Finished modprobe@loop.service. May 17 00:47:48.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.290413 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:47:48.296946 systemd[1]: Mounted usr-share-oem.mount. May 17 00:47:48.299660 systemd[1]: Finished systemd-sysext.service. May 17 00:47:48.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.304282 systemd[1]: Starting ensure-sysext.service... May 17 00:47:48.306925 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:47:48.321687 systemd[1]: Reloading. May 17 00:47:48.356976 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:47:48.369040 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:47:48.381296 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:47:48.541080 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-05-17T00:47:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:47:48.541113 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-05-17T00:47:48Z" level=info msg="torcx already run" May 17 00:47:48.561003 ldconfig[1039]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:47:48.690153 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:47:48.690188 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:47:48.722607 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:47:48.804000 audit: BPF prog-id=30 op=LOAD May 17 00:47:48.804000 audit: BPF prog-id=21 op=UNLOAD May 17 00:47:48.804000 audit: BPF prog-id=31 op=LOAD May 17 00:47:48.804000 audit: BPF prog-id=32 op=LOAD May 17 00:47:48.804000 audit: BPF prog-id=22 op=UNLOAD May 17 00:47:48.804000 audit: BPF prog-id=23 op=UNLOAD May 17 00:47:48.807000 audit: BPF prog-id=33 op=LOAD May 17 00:47:48.807000 audit: BPF prog-id=34 op=LOAD May 17 00:47:48.807000 audit: BPF prog-id=24 op=UNLOAD May 17 00:47:48.807000 audit: BPF prog-id=25 op=UNLOAD May 17 00:47:48.809000 audit: BPF prog-id=35 op=LOAD May 17 00:47:48.809000 audit: BPF prog-id=27 op=UNLOAD May 17 00:47:48.809000 audit: BPF prog-id=36 op=LOAD May 17 00:47:48.809000 audit: BPF prog-id=37 op=LOAD May 17 00:47:48.809000 audit: BPF prog-id=28 op=UNLOAD May 17 00:47:48.809000 audit: BPF prog-id=29 op=UNLOAD May 17 00:47:48.810000 audit: BPF prog-id=38 op=LOAD May 17 00:47:48.810000 audit: BPF prog-id=26 op=UNLOAD May 17 00:47:48.814080 systemd[1]: Finished ldconfig.service. May 17 00:47:48.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.816273 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:47:48.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.821936 systemd[1]: Starting audit-rules.service... May 17 00:47:48.824263 systemd[1]: Starting clean-ca-certificates.service... May 17 00:47:48.830247 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:47:48.836000 audit: BPF prog-id=39 op=LOAD May 17 00:47:48.838380 systemd[1]: Starting systemd-resolved.service... May 17 00:47:48.839000 audit: BPF prog-id=40 op=LOAD May 17 00:47:48.841302 systemd[1]: Starting systemd-timesyncd.service... May 17 00:47:48.845353 systemd[1]: Starting systemd-update-utmp.service... May 17 00:47:48.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.846970 systemd[1]: Finished clean-ca-certificates.service. May 17 00:47:48.856983 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:48.861784 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:47:48.864657 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:47:48.867000 audit[1131]: SYSTEM_BOOT pid=1131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:47:48.870030 systemd[1]: Starting modprobe@loop.service... May 17 00:47:48.870784 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:47:48.871078 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:48.871412 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:47:48.873074 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:47:48.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.873327 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:47:48.879550 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:47:48.879806 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:47:48.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.881008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:47:48.884903 systemd[1]: Finished systemd-update-utmp.service. May 17 00:47:48.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.888479 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:48.892020 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:47:48.896536 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:47:48.897195 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:47:48.897573 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:48.897793 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:47:48.904346 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:47:48.904559 systemd[1]: Finished modprobe@loop.service. May 17 00:47:48.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.906098 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:47:48.908931 systemd[1]: Starting modprobe@drm.service... May 17 00:47:48.910533 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:47:48.911229 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:48.916296 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:47:48.917097 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:47:48.923927 systemd[1]: Finished ensure-sysext.service. May 17 00:47:48.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.924952 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:47:48.925150 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:47:48.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.926084 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:47:48.926286 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:47:48.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.927028 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:47:48.927097 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:47:48.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.929011 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:47:48.929232 systemd[1]: Finished modprobe@drm.service. May 17 00:47:48.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.949796 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:47:48.952704 systemd[1]: Starting systemd-update-done.service... May 17 00:47:48.969209 systemd[1]: Finished systemd-update-done.service. May 17 00:47:48.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:48.994000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:47:48.994000 audit[1153]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe0af5fe0 a2=420 a3=0 items=0 ppid=1125 pid=1153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:48.994000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:47:48.996028 augenrules[1153]: No rules May 17 00:47:48.997419 systemd[1]: Finished audit-rules.service. May 17 00:47:49.015308 systemd[1]: Started systemd-timesyncd.service. May 17 00:47:49.016061 systemd[1]: Reached target time-set.target. May 17 00:47:49.017572 systemd-resolved[1129]: Positive Trust Anchors: May 17 00:47:49.017589 systemd-resolved[1129]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:47:49.017644 systemd-resolved[1129]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:47:49.026359 systemd-resolved[1129]: Using system hostname 'ci-3510.3.7-n-f656071047'. May 17 00:47:49.033211 systemd[1]: Started systemd-resolved.service. May 17 00:47:49.033765 systemd[1]: Reached target network.target. May 17 00:47:49.034113 systemd[1]: Reached target nss-lookup.target. May 17 00:47:49.034418 systemd[1]: Reached target sysinit.target. May 17 00:47:49.034808 systemd[1]: Started motdgen.path. May 17 00:47:49.035145 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:47:49.035832 systemd[1]: Started logrotate.timer. May 17 00:47:49.036329 systemd[1]: Started mdadm.timer. May 17 00:47:49.036651 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:47:49.037032 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:47:49.037065 systemd[1]: Reached target paths.target. May 17 00:47:49.037343 systemd[1]: Reached target timers.target. May 17 00:47:49.038219 systemd[1]: Listening on dbus.socket. May 17 00:47:49.040546 systemd[1]: Starting docker.socket... May 17 00:47:49.045495 systemd[1]: Listening on sshd.socket. May 17 00:47:49.046371 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:49.046570 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:49.046645 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:47:49.047575 systemd[1]: Listening on docker.socket. May 17 00:47:49.048205 systemd[1]: Reached target sockets.target. May 17 00:47:49.048671 systemd[1]: Reached target basic.target. May 17 00:47:49.049156 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:47:49.049198 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:47:49.051127 systemd[1]: Starting containerd.service... May 17 00:47:49.055022 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:47:49.057934 systemd[1]: Starting dbus.service... May 17 00:47:49.062313 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:47:49.066930 systemd[1]: Starting extend-filesystems.service... May 17 00:47:49.084821 jq[1166]: false May 17 00:47:49.069172 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:47:49.074608 systemd[1]: Starting motdgen.service... May 17 00:47:49.079010 systemd[1]: Starting prepare-helm.service... May 17 00:47:49.081405 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:47:49.083895 systemd[1]: Starting sshd-keygen.service... May 17 00:47:49.085775 systemd-timesyncd[1130]: Contacted time server 23.94.221.138:123 (0.flatcar.pool.ntp.org). May 17 00:47:49.085861 systemd-timesyncd[1130]: Initial clock synchronization to Sat 2025-05-17 00:47:48.865485 UTC. May 17 00:47:49.090408 systemd[1]: Starting systemd-logind.service... May 17 00:47:49.091061 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:49.091206 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:47:49.100189 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:47:49.101754 systemd[1]: Starting update-engine.service... May 17 00:47:49.104688 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:47:49.110507 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:47:49.110827 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:47:49.113309 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:47:49.114951 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:47:49.125236 jq[1178]: true May 17 00:47:49.157389 tar[1185]: linux-amd64/helm May 17 00:47:49.170315 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:47:49.170674 systemd[1]: Finished motdgen.service. May 17 00:47:49.183720 dbus-daemon[1163]: [system] SELinux support is enabled May 17 00:47:49.184856 systemd[1]: Started dbus.service. May 17 00:47:49.190762 jq[1187]: true May 17 00:47:49.189163 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:47:49.189229 systemd[1]: Reached target system-config.target. May 17 00:47:49.189880 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:47:49.189910 systemd[1]: Reached target user-config.target. May 17 00:47:49.223032 extend-filesystems[1167]: Found loop1 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda May 17 00:47:49.223032 extend-filesystems[1167]: Found vda1 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda2 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda3 May 17 00:47:49.223032 extend-filesystems[1167]: Found usr May 17 00:47:49.223032 extend-filesystems[1167]: Found vda4 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda6 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda7 May 17 00:47:49.223032 extend-filesystems[1167]: Found vda9 May 17 00:47:49.223032 extend-filesystems[1167]: Checking size of /dev/vda9 May 17 00:47:49.270194 extend-filesystems[1167]: Resized partition /dev/vda9 May 17 00:47:49.287780 update_engine[1177]: I0517 00:47:49.286777 1177 main.cc:92] Flatcar Update Engine starting May 17 00:47:49.292609 systemd[1]: Started update-engine.service. May 17 00:47:49.297127 update_engine[1177]: I0517 00:47:49.292685 1177 update_check_scheduler.cc:74] Next update check in 9m47s May 17 00:47:49.296014 systemd[1]: Started locksmithd.service. May 17 00:47:49.300857 extend-filesystems[1211]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:47:49.313660 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 17 00:47:49.381434 bash[1216]: Updated "/home/core/.ssh/authorized_keys" May 17 00:47:49.380478 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:47:49.391104 coreos-metadata[1162]: May 17 00:47:49.390 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:47:49.409547 coreos-metadata[1162]: May 17 00:47:49.408 INFO Fetch successful May 17 00:47:49.420366 unknown[1162]: wrote ssh authorized keys file for user: core May 17 00:47:49.447237 env[1186]: time="2025-05-17T00:47:49.446003610Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:47:49.452283 update-ssh-keys[1220]: Updated "/home/core/.ssh/authorized_keys" May 17 00:47:49.477489 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 17 00:47:49.453185 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:47:49.480019 systemd-logind[1173]: Watching system buttons on /dev/input/event2 (Power Button) May 17 00:47:49.480058 systemd-logind[1173]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:47:49.481229 extend-filesystems[1211]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:47:49.481229 extend-filesystems[1211]: old_desc_blocks = 1, new_desc_blocks = 8 May 17 00:47:49.481229 extend-filesystems[1211]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 17 00:47:49.491179 extend-filesystems[1167]: Resized filesystem in /dev/vda9 May 17 00:47:49.491179 extend-filesystems[1167]: Found vdb May 17 00:47:49.482065 systemd-logind[1173]: New seat seat0. May 17 00:47:49.482273 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:47:49.482502 systemd[1]: Finished extend-filesystems.service. May 17 00:47:49.489241 systemd[1]: Started systemd-logind.service. May 17 00:47:49.510006 systemd-networkd[1002]: eth1: Gained IPv6LL May 17 00:47:49.513885 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:47:49.515035 systemd[1]: Reached target network-online.target. May 17 00:47:49.518121 systemd[1]: Starting kubelet.service... May 17 00:47:49.541466 env[1186]: time="2025-05-17T00:47:49.541049589Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:47:49.541466 env[1186]: time="2025-05-17T00:47:49.541310195Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.546030 env[1186]: time="2025-05-17T00:47:49.545935646Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:49.546030 env[1186]: time="2025-05-17T00:47:49.546007586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.546471 env[1186]: time="2025-05-17T00:47:49.546418065Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:49.546471 env[1186]: time="2025-05-17T00:47:49.546465451Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.546656 env[1186]: time="2025-05-17T00:47:49.546487166Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:47:49.546656 env[1186]: time="2025-05-17T00:47:49.546503896Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.546745 env[1186]: time="2025-05-17T00:47:49.546672928Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.547144 env[1186]: time="2025-05-17T00:47:49.547101938Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:49.548458 env[1186]: time="2025-05-17T00:47:49.547424263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:49.548458 env[1186]: time="2025-05-17T00:47:49.547465354Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:47:49.548458 env[1186]: time="2025-05-17T00:47:49.547574176Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:47:49.548458 env[1186]: time="2025-05-17T00:47:49.547629637Z" level=info msg="metadata content store policy set" policy=shared May 17 00:47:49.552853 env[1186]: time="2025-05-17T00:47:49.552776627Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:47:49.552853 env[1186]: time="2025-05-17T00:47:49.552850198Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:47:49.552853 env[1186]: time="2025-05-17T00:47:49.552872470Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:47:49.553154 env[1186]: time="2025-05-17T00:47:49.552942453Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553154 env[1186]: time="2025-05-17T00:47:49.552970600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553154 env[1186]: time="2025-05-17T00:47:49.553104226Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553154 env[1186]: time="2025-05-17T00:47:49.553128101Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553154 env[1186]: time="2025-05-17T00:47:49.553146963Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553359 env[1186]: time="2025-05-17T00:47:49.553165789Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553359 env[1186]: time="2025-05-17T00:47:49.553185438Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553359 env[1186]: time="2025-05-17T00:47:49.553204475Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:47:49.553359 env[1186]: time="2025-05-17T00:47:49.553224951Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:47:49.553505 env[1186]: time="2025-05-17T00:47:49.553451030Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:47:49.553773 env[1186]: time="2025-05-17T00:47:49.553681169Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:47:49.554310 env[1186]: time="2025-05-17T00:47:49.554262342Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:47:49.554412 env[1186]: time="2025-05-17T00:47:49.554320889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554412 env[1186]: time="2025-05-17T00:47:49.554345332Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:47:49.554492 env[1186]: time="2025-05-17T00:47:49.554426752Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554559 env[1186]: time="2025-05-17T00:47:49.554458592Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554646 env[1186]: time="2025-05-17T00:47:49.554566650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554646 env[1186]: time="2025-05-17T00:47:49.554599397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554646 env[1186]: time="2025-05-17T00:47:49.554621938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554646 env[1186]: time="2025-05-17T00:47:49.554640262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554804 env[1186]: time="2025-05-17T00:47:49.554669284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554804 env[1186]: time="2025-05-17T00:47:49.554689153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:47:49.554804 env[1186]: time="2025-05-17T00:47:49.554719409Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:47:49.555022 env[1186]: time="2025-05-17T00:47:49.554947338Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:47:49.555022 env[1186]: time="2025-05-17T00:47:49.554982862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:47:49.555022 env[1186]: time="2025-05-17T00:47:49.555003129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:47:49.555022 env[1186]: time="2025-05-17T00:47:49.555020533Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:47:49.555212 env[1186]: time="2025-05-17T00:47:49.555044669Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:47:49.555212 env[1186]: time="2025-05-17T00:47:49.555062306Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:47:49.555212 env[1186]: time="2025-05-17T00:47:49.555089238Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:47:49.555212 env[1186]: time="2025-05-17T00:47:49.555162753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:47:49.556962 env[1186]: time="2025-05-17T00:47:49.556246721Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:47:49.556962 env[1186]: time="2025-05-17T00:47:49.556360147Z" level=info msg="Connect containerd service" May 17 00:47:49.556962 env[1186]: time="2025-05-17T00:47:49.556420162Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.558462128Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.559640398Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.559737056Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.559817837Z" level=info msg="containerd successfully booted in 0.116997s" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.560994750Z" level=info msg="Start subscribing containerd event" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.561091990Z" level=info msg="Start recovering state" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.561477408Z" level=info msg="Start event monitor" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.561533845Z" level=info msg="Start snapshots syncer" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.561553625Z" level=info msg="Start cni network conf syncer for default" May 17 00:47:49.561620 env[1186]: time="2025-05-17T00:47:49.561579948Z" level=info msg="Start streaming server" May 17 00:47:49.559985 systemd[1]: Started containerd.service. May 17 00:47:49.701996 systemd-networkd[1002]: eth0: Gained IPv6LL May 17 00:47:49.930598 sshd_keygen[1191]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:47:50.021542 systemd[1]: Finished sshd-keygen.service. May 17 00:47:50.024972 systemd[1]: Starting issuegen.service... May 17 00:47:50.043014 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:47:50.043285 systemd[1]: Finished issuegen.service. May 17 00:47:50.046824 systemd[1]: Starting systemd-user-sessions.service... May 17 00:47:50.066307 systemd[1]: Finished systemd-user-sessions.service. May 17 00:47:50.069188 systemd[1]: Started getty@tty1.service. May 17 00:47:50.072323 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:47:50.075508 systemd[1]: Reached target getty.target. May 17 00:47:50.197329 tar[1185]: linux-amd64/LICENSE May 17 00:47:50.197329 tar[1185]: linux-amd64/README.md May 17 00:47:50.206079 systemd[1]: Finished prepare-helm.service. May 17 00:47:50.235532 locksmithd[1212]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:47:50.327421 systemd[1]: Created slice system-sshd.slice. May 17 00:47:50.330193 systemd[1]: Started sshd@0-24.199.117.67:22-147.75.109.163:58444.service. May 17 00:47:50.428509 sshd[1246]: Accepted publickey for core from 147.75.109.163 port 58444 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:47:50.431523 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.455974 systemd[1]: Created slice user-500.slice. May 17 00:47:50.460643 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:47:50.478174 systemd-logind[1173]: New session 1 of user core. May 17 00:47:50.488250 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:47:50.492128 systemd[1]: Starting user@500.service... May 17 00:47:50.499743 (systemd)[1249]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.606001 systemd[1249]: Queued start job for default target default.target. May 17 00:47:50.608288 systemd[1249]: Reached target paths.target. May 17 00:47:50.608631 systemd[1249]: Reached target sockets.target. May 17 00:47:50.608806 systemd[1249]: Reached target timers.target. May 17 00:47:50.608931 systemd[1249]: Reached target basic.target. May 17 00:47:50.609124 systemd[1249]: Reached target default.target. May 17 00:47:50.609315 systemd[1]: Started user@500.service. May 17 00:47:50.609441 systemd[1249]: Startup finished in 96ms. May 17 00:47:50.612320 systemd[1]: Started session-1.scope. May 17 00:47:50.686829 systemd[1]: Started sshd@1-24.199.117.67:22-147.75.109.163:58456.service. May 17 00:47:50.793893 sshd[1258]: Accepted publickey for core from 147.75.109.163 port 58456 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:47:50.796248 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.805614 systemd[1]: Started session-2.scope. May 17 00:47:50.806979 systemd-logind[1173]: New session 2 of user core. May 17 00:47:50.880683 sshd[1258]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.889426 systemd[1]: Started sshd@2-24.199.117.67:22-147.75.109.163:58466.service. May 17 00:47:50.895050 systemd[1]: sshd@1-24.199.117.67:22-147.75.109.163:58456.service: Deactivated successfully. May 17 00:47:50.896221 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:47:50.899996 systemd-logind[1173]: Session 2 logged out. Waiting for processes to exit. May 17 00:47:50.901864 systemd-logind[1173]: Removed session 2. May 17 00:47:50.956083 sshd[1263]: Accepted publickey for core from 147.75.109.163 port 58466 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:47:50.957679 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.967368 systemd[1]: Started session-3.scope. May 17 00:47:50.967705 systemd-logind[1173]: New session 3 of user core. May 17 00:47:51.039908 sshd[1263]: pam_unix(sshd:session): session closed for user core May 17 00:47:51.044814 systemd-logind[1173]: Session 3 logged out. Waiting for processes to exit. May 17 00:47:51.046795 systemd[1]: sshd@2-24.199.117.67:22-147.75.109.163:58466.service: Deactivated successfully. May 17 00:47:51.047800 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:47:51.049809 systemd-logind[1173]: Removed session 3. May 17 00:47:51.153737 systemd[1]: Started kubelet.service. May 17 00:47:51.155323 systemd[1]: Reached target multi-user.target. May 17 00:47:51.161833 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:47:51.177794 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:47:51.178035 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:47:51.178742 systemd[1]: Startup finished in 1.036s (kernel) + 5.571s (initrd) + 8.765s (userspace) = 15.374s. May 17 00:47:52.242715 kubelet[1272]: E0517 00:47:52.242575 1272 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:52.245577 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:52.245764 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:52.246143 systemd[1]: kubelet.service: Consumed 1.740s CPU time. May 17 00:48:00.905691 systemd[1]: Started sshd@3-24.199.117.67:22-147.75.109.163:44804.service. May 17 00:48:00.963631 sshd[1280]: Accepted publickey for core from 147.75.109.163 port 44804 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:00.966821 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:00.974412 systemd[1]: Started session-4.scope. May 17 00:48:00.975937 systemd-logind[1173]: New session 4 of user core. May 17 00:48:01.043744 sshd[1280]: pam_unix(sshd:session): session closed for user core May 17 00:48:01.051209 systemd[1]: Started sshd@4-24.199.117.67:22-147.75.109.163:44814.service. May 17 00:48:01.053130 systemd[1]: sshd@3-24.199.117.67:22-147.75.109.163:44804.service: Deactivated successfully. May 17 00:48:01.054209 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:48:01.056497 systemd-logind[1173]: Session 4 logged out. Waiting for processes to exit. May 17 00:48:01.058804 systemd-logind[1173]: Removed session 4. May 17 00:48:01.109278 sshd[1285]: Accepted publickey for core from 147.75.109.163 port 44814 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:01.111467 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:01.119220 systemd[1]: Started session-5.scope. May 17 00:48:01.119937 systemd-logind[1173]: New session 5 of user core. May 17 00:48:01.181702 sshd[1285]: pam_unix(sshd:session): session closed for user core May 17 00:48:01.188337 systemd[1]: sshd@4-24.199.117.67:22-147.75.109.163:44814.service: Deactivated successfully. May 17 00:48:01.189216 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:48:01.191243 systemd-logind[1173]: Session 5 logged out. Waiting for processes to exit. May 17 00:48:01.193629 systemd[1]: Started sshd@5-24.199.117.67:22-147.75.109.163:44816.service. May 17 00:48:01.195573 systemd-logind[1173]: Removed session 5. May 17 00:48:01.256913 sshd[1292]: Accepted publickey for core from 147.75.109.163 port 44816 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:01.260356 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:01.267083 systemd-logind[1173]: New session 6 of user core. May 17 00:48:01.268255 systemd[1]: Started session-6.scope. May 17 00:48:01.357928 sshd[1292]: pam_unix(sshd:session): session closed for user core May 17 00:48:01.363847 systemd[1]: sshd@5-24.199.117.67:22-147.75.109.163:44816.service: Deactivated successfully. May 17 00:48:01.365028 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:48:01.366282 systemd-logind[1173]: Session 6 logged out. Waiting for processes to exit. May 17 00:48:01.369000 systemd[1]: Started sshd@6-24.199.117.67:22-147.75.109.163:44832.service. May 17 00:48:01.371827 systemd-logind[1173]: Removed session 6. May 17 00:48:01.450229 sshd[1298]: Accepted publickey for core from 147.75.109.163 port 44832 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:01.451157 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:01.460293 systemd-logind[1173]: New session 7 of user core. May 17 00:48:01.461353 systemd[1]: Started session-7.scope. May 17 00:48:01.546378 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:48:01.546837 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:48:01.557178 dbus-daemon[1163]: \xd0\xed?\x94\x8eU: received setenforce notice (enforcing=156232112) May 17 00:48:01.562088 sudo[1301]: pam_unix(sudo:session): session closed for user root May 17 00:48:01.568369 sshd[1298]: pam_unix(sshd:session): session closed for user core May 17 00:48:01.577353 systemd[1]: Started sshd@7-24.199.117.67:22-147.75.109.163:44836.service. May 17 00:48:01.580275 systemd[1]: sshd@6-24.199.117.67:22-147.75.109.163:44832.service: Deactivated successfully. May 17 00:48:01.581490 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:48:01.583460 systemd-logind[1173]: Session 7 logged out. Waiting for processes to exit. May 17 00:48:01.585561 systemd-logind[1173]: Removed session 7. May 17 00:48:01.639215 sshd[1304]: Accepted publickey for core from 147.75.109.163 port 44836 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:01.642842 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:01.650503 systemd-logind[1173]: New session 8 of user core. May 17 00:48:01.651547 systemd[1]: Started session-8.scope. May 17 00:48:01.723263 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:48:01.724199 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:48:01.729866 sudo[1309]: pam_unix(sudo:session): session closed for user root May 17 00:48:01.739901 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:48:01.740896 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:48:01.755299 systemd[1]: Stopping audit-rules.service... May 17 00:48:01.757000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:48:01.760984 kernel: kauditd_printk_skb: 179 callbacks suppressed May 17 00:48:01.761348 kernel: audit: type=1305 audit(1747442881.757:221): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:48:01.761437 kernel: audit: type=1300 audit(1747442881.757:221): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4b549a20 a2=420 a3=0 items=0 ppid=1 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:01.757000 audit[1312]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4b549a20 a2=420 a3=0 items=0 ppid=1 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:01.764971 auditctl[1312]: No rules May 17 00:48:01.757000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:48:01.766234 kernel: audit: type=1327 audit(1747442881.757:221): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:48:01.766096 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:48:01.766863 systemd[1]: Stopped audit-rules.service. May 17 00:48:01.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.770747 kernel: audit: type=1131 audit(1747442881.766:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.771971 systemd[1]: Starting audit-rules.service... May 17 00:48:01.812838 augenrules[1329]: No rules May 17 00:48:01.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.814190 systemd[1]: Finished audit-rules.service. May 17 00:48:01.816083 sudo[1308]: pam_unix(sudo:session): session closed for user root May 17 00:48:01.820654 kernel: audit: type=1130 audit(1747442881.813:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.814000 audit[1308]: USER_END pid=1308 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.826370 kernel: audit: type=1106 audit(1747442881.814:224): pid=1308 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.826062 sshd[1304]: pam_unix(sshd:session): session closed for user core May 17 00:48:01.814000 audit[1308]: CRED_DISP pid=1308 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.832221 kernel: audit: type=1104 audit(1747442881.814:225): pid=1308 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.836382 systemd[1]: Started sshd@8-24.199.117.67:22-147.75.109.163:44840.service. May 17 00:48:01.837208 systemd[1]: sshd@7-24.199.117.67:22-147.75.109.163:44836.service: Deactivated successfully. May 17 00:48:01.838497 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:48:01.831000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.844858 kernel: audit: type=1106 audit(1747442881.831:226): pid=1304 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.831000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.851283 kernel: audit: type=1104 audit(1747442881.831:227): pid=1304 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.850360 systemd-logind[1173]: Session 8 logged out. Waiting for processes to exit. May 17 00:48:01.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.199.117.67:22-147.75.109.163:44840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-24.199.117.67:22-147.75.109.163:44836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.856640 kernel: audit: type=1130 audit(1747442881.835:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.199.117.67:22-147.75.109.163:44840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:01.857115 systemd-logind[1173]: Removed session 8. May 17 00:48:01.900000 audit[1334]: USER_ACCT pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.901253 sshd[1334]: Accepted publickey for core from 147.75.109.163 port 44840 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:48:01.903000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.904000 audit[1334]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaf5b82d0 a2=3 a3=0 items=0 ppid=1 pid=1334 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:01.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:48:01.906268 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:48:01.915425 systemd[1]: Started session-9.scope. May 17 00:48:01.915694 systemd-logind[1173]: New session 9 of user core. May 17 00:48:01.925000 audit[1334]: USER_START pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.929000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:01.986153 sudo[1338]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:48:01.987218 sudo[1338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:48:01.984000 audit[1338]: USER_ACCT pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.985000 audit[1338]: CRED_REFR pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:01.991000 audit[1338]: USER_START pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:02.041334 systemd[1]: Starting docker.service... May 17 00:48:02.121793 env[1349]: time="2025-05-17T00:48:02.121701299Z" level=info msg="Starting up" May 17 00:48:02.125344 env[1349]: time="2025-05-17T00:48:02.125292100Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:48:02.125612 env[1349]: time="2025-05-17T00:48:02.125551020Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:48:02.125766 env[1349]: time="2025-05-17T00:48:02.125737367Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:48:02.125855 env[1349]: time="2025-05-17T00:48:02.125835631Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:48:02.135753 env[1349]: time="2025-05-17T00:48:02.135691548Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:48:02.136119 env[1349]: time="2025-05-17T00:48:02.136084194Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:48:02.136261 env[1349]: time="2025-05-17T00:48:02.136234021Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:48:02.136430 env[1349]: time="2025-05-17T00:48:02.136405126Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:48:02.181649 env[1349]: time="2025-05-17T00:48:02.181567478Z" level=info msg="Loading containers: start." May 17 00:48:02.289000 audit[1380]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.289000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe6dd73850 a2=0 a3=7ffe6dd7383c items=0 ppid=1349 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:48:02.295000 audit[1382]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.295000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd956000b0 a2=0 a3=7ffd9560009c items=0 ppid=1349 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:48:02.300000 audit[1384]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.300000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc251a7da0 a2=0 a3=7ffc251a7d8c items=0 ppid=1349 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:48:02.304000 audit[1386]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.304000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcb31a3940 a2=0 a3=7ffcb31a392c items=0 ppid=1349 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:48:02.311000 audit[1388]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.311000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb89d6710 a2=0 a3=7ffcb89d66fc items=0 ppid=1349 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:48:02.336000 audit[1393]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.336000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda21e5e40 a2=0 a3=7ffda21e5e2c items=0 ppid=1349 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:48:02.345000 audit[1395]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.345000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd43b8120 a2=0 a3=7fffd43b810c items=0 ppid=1349 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.345000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:48:02.350000 audit[1397]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.350000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffce60d8ca0 a2=0 a3=7ffce60d8c8c items=0 ppid=1349 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:48:02.354000 audit[1399]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.354000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeef2631e0 a2=0 a3=7ffeef2631cc items=0 ppid=1349 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:48:02.367000 audit[1403]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.367000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe63cf1070 a2=0 a3=7ffe63cf105c items=0 ppid=1349 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.367000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:48:02.373000 audit[1404]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.373000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff34863db0 a2=0 a3=7fff34863d9c items=0 ppid=1349 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:48:02.389621 kernel: Initializing XFRM netlink socket May 17 00:48:02.443873 env[1349]: time="2025-05-17T00:48:02.443808769Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:48:02.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:02.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:02.461946 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:48:02.462112 systemd[1]: Stopped kubelet.service. May 17 00:48:02.462187 systemd[1]: kubelet.service: Consumed 1.740s CPU time. May 17 00:48:02.464445 systemd[1]: Starting kubelet.service... May 17 00:48:02.500000 audit[1414]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.500000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc56ad5590 a2=0 a3=7ffc56ad557c items=0 ppid=1349 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:48:02.517000 audit[1417]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.517000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc5ef96b00 a2=0 a3=7ffc5ef96aec items=0 ppid=1349 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.517000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:48:02.525000 audit[1420]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.525000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc04187450 a2=0 a3=7ffc0418743c items=0 ppid=1349 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.525000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:48:02.529000 audit[1422]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.529000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcfd677100 a2=0 a3=7ffcfd6770ec items=0 ppid=1349 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:48:02.533000 audit[1424]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.533000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffeee9c9e10 a2=0 a3=7ffeee9c9dfc items=0 ppid=1349 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:48:02.536000 audit[1426]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.536000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcba1807c0 a2=0 a3=7ffcba1807ac items=0 ppid=1349 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:48:02.540000 audit[1428]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.540000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd3dcdd560 a2=0 a3=7ffd3dcdd54c items=0 ppid=1349 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:48:02.555000 audit[1431]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.555000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff69388500 a2=0 a3=7fff693884ec items=0 ppid=1349 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.555000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:48:02.562000 audit[1433]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.562000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffdcdf0ce0 a2=0 a3=7fffdcdf0ccc items=0 ppid=1349 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:48:02.566000 audit[1435]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.566000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcf6257160 a2=0 a3=7ffcf625714c items=0 ppid=1349 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:48:02.570000 audit[1437]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.570000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff7150b7c0 a2=0 a3=7fff7150b7ac items=0 ppid=1349 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:48:02.571535 systemd-networkd[1002]: docker0: Link UP May 17 00:48:02.584000 audit[1441]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.584000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5c452610 a2=0 a3=7ffd5c4525fc items=0 ppid=1349 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.584000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:48:02.591000 audit[1442]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:02.591000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd3ad8ca10 a2=0 a3=7ffd3ad8c9fc items=0 ppid=1349 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:02.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:48:02.592530 env[1349]: time="2025-05-17T00:48:02.592350432Z" level=info msg="Loading containers: done." May 17 00:48:02.613943 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2058076276-merged.mount: Deactivated successfully. May 17 00:48:02.620062 env[1349]: time="2025-05-17T00:48:02.620002912Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:48:02.620337 env[1349]: time="2025-05-17T00:48:02.620229736Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:48:02.620401 env[1349]: time="2025-05-17T00:48:02.620355798Z" level=info msg="Daemon has completed initialization" May 17 00:48:02.641918 systemd[1]: Started docker.service. May 17 00:48:02.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:02.662132 env[1349]: time="2025-05-17T00:48:02.662060880Z" level=info msg="API listen on /run/docker.sock" May 17 00:48:02.697501 systemd[1]: Starting coreos-metadata.service... May 17 00:48:02.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:02.713563 systemd[1]: Started kubelet.service. May 17 00:48:02.762135 coreos-metadata[1469]: May 17 00:48:02.762 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:48:02.777750 coreos-metadata[1469]: May 17 00:48:02.777 INFO Fetch successful May 17 00:48:02.800848 systemd[1]: Finished coreos-metadata.service. May 17 00:48:02.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:02.822526 kubelet[1474]: E0517 00:48:02.821618 1474 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:02.830263 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:02.830451 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:02.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:03.810348 env[1186]: time="2025-05-17T00:48:03.810272347Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:48:04.453591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1294882432.mount: Deactivated successfully. May 17 00:48:06.235978 env[1186]: time="2025-05-17T00:48:06.235905973Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:06.238379 env[1186]: time="2025-05-17T00:48:06.238309283Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:06.241669 env[1186]: time="2025-05-17T00:48:06.241612180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:06.244381 env[1186]: time="2025-05-17T00:48:06.244310660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:06.246150 env[1186]: time="2025-05-17T00:48:06.246084315Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1\"" May 17 00:48:06.247232 env[1186]: time="2025-05-17T00:48:06.247186235Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:48:08.208475 env[1186]: time="2025-05-17T00:48:08.208398442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:08.210292 env[1186]: time="2025-05-17T00:48:08.210228427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:08.213654 env[1186]: time="2025-05-17T00:48:08.213600092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:08.215922 env[1186]: time="2025-05-17T00:48:08.215867465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:08.217607 env[1186]: time="2025-05-17T00:48:08.217490636Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2\"" May 17 00:48:08.218700 env[1186]: time="2025-05-17T00:48:08.218655659Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:48:09.797955 env[1186]: time="2025-05-17T00:48:09.797880433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.799572 env[1186]: time="2025-05-17T00:48:09.799522820Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.802323 env[1186]: time="2025-05-17T00:48:09.802265608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.805177 env[1186]: time="2025-05-17T00:48:09.805119225Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.806659 env[1186]: time="2025-05-17T00:48:09.806582640Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3\"" May 17 00:48:09.807765 env[1186]: time="2025-05-17T00:48:09.807721770Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:48:11.055927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2288780632.mount: Deactivated successfully. May 17 00:48:11.965531 env[1186]: time="2025-05-17T00:48:11.965456403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:11.967323 env[1186]: time="2025-05-17T00:48:11.967265035Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:11.969466 env[1186]: time="2025-05-17T00:48:11.969408036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:11.971387 env[1186]: time="2025-05-17T00:48:11.971325449Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:11.972920 env[1186]: time="2025-05-17T00:48:11.972851734Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:48:11.974001 env[1186]: time="2025-05-17T00:48:11.973957624Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:48:12.440262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3047419135.mount: Deactivated successfully. May 17 00:48:13.081822 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:48:13.090151 kernel: kauditd_printk_skb: 89 callbacks suppressed May 17 00:48:13.090339 kernel: audit: type=1130 audit(1747442893.081:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.090384 kernel: audit: type=1131 audit(1747442893.081:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.082108 systemd[1]: Stopped kubelet.service. May 17 00:48:13.085071 systemd[1]: Starting kubelet.service... May 17 00:48:13.249720 systemd[1]: Started kubelet.service. May 17 00:48:13.253993 kernel: audit: type=1130 audit(1747442893.249:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.345330 kubelet[1502]: E0517 00:48:13.344438 1502 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:13.346571 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:13.346784 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:13.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:13.350707 kernel: audit: type=1131 audit(1747442893.346:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:13.924458 env[1186]: time="2025-05-17T00:48:13.924372025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.926868 env[1186]: time="2025-05-17T00:48:13.926810454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.929768 env[1186]: time="2025-05-17T00:48:13.929704403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.937867 env[1186]: time="2025-05-17T00:48:13.937682859Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:48:13.939703 env[1186]: time="2025-05-17T00:48:13.939628223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.940256 env[1186]: time="2025-05-17T00:48:13.939676344Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:48:14.406118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1590977353.mount: Deactivated successfully. May 17 00:48:14.412244 env[1186]: time="2025-05-17T00:48:14.412158422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:14.414889 env[1186]: time="2025-05-17T00:48:14.414825705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:14.417108 env[1186]: time="2025-05-17T00:48:14.417041273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:14.418961 env[1186]: time="2025-05-17T00:48:14.418888262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:14.420140 env[1186]: time="2025-05-17T00:48:14.420075493Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:48:14.421134 env[1186]: time="2025-05-17T00:48:14.421092166Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:48:14.943115 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1404955346.mount: Deactivated successfully. May 17 00:48:18.085878 env[1186]: time="2025-05-17T00:48:18.085765284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.088629 env[1186]: time="2025-05-17T00:48:18.088424291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.091496 env[1186]: time="2025-05-17T00:48:18.091436100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.094978 env[1186]: time="2025-05-17T00:48:18.094912167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.096497 env[1186]: time="2025-05-17T00:48:18.096438334Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 17 00:48:22.327572 systemd[1]: Stopped kubelet.service. May 17 00:48:22.336401 kernel: audit: type=1130 audit(1747442902.327:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.336582 kernel: audit: type=1131 audit(1747442902.327:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.330822 systemd[1]: Starting kubelet.service... May 17 00:48:22.381767 systemd[1]: Reloading. May 17 00:48:22.544868 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-05-17T00:48:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:48:22.547815 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-05-17T00:48:22Z" level=info msg="torcx already run" May 17 00:48:22.657470 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:48:22.658342 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:48:22.681813 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:48:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.772431 kernel: audit: type=1400 audit(1747442902.767:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.772564 kernel: audit: type=1400 audit(1747442902.767:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.772602 kernel: audit: type=1400 audit(1747442902.769:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.776993 kernel: audit: type=1400 audit(1747442902.769:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.777129 kernel: audit: type=1400 audit(1747442902.769:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.783812 kernel: audit: type=1400 audit(1747442902.769:279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.784016 kernel: audit: type=1400 audit(1747442902.769:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.784061 kernel: audit: type=1400 audit(1747442902.769:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit: BPF prog-id=46 op=LOAD May 17 00:48:22.774000 audit: BPF prog-id=30 op=UNLOAD May 17 00:48:22.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit: BPF prog-id=47 op=LOAD May 17 00:48:22.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.785000 audit: BPF prog-id=48 op=LOAD May 17 00:48:22.786000 audit: BPF prog-id=31 op=UNLOAD May 17 00:48:22.786000 audit: BPF prog-id=32 op=UNLOAD May 17 00:48:22.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit: BPF prog-id=49 op=LOAD May 17 00:48:22.792000 audit: BPF prog-id=41 op=UNLOAD May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit: BPF prog-id=50 op=LOAD May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.792000 audit: BPF prog-id=51 op=LOAD May 17 00:48:22.792000 audit: BPF prog-id=42 op=UNLOAD May 17 00:48:22.792000 audit: BPF prog-id=43 op=UNLOAD May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit: BPF prog-id=52 op=LOAD May 17 00:48:22.794000 audit: BPF prog-id=44 op=UNLOAD May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit: BPF prog-id=53 op=LOAD May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.794000 audit: BPF prog-id=54 op=LOAD May 17 00:48:22.794000 audit: BPF prog-id=33 op=UNLOAD May 17 00:48:22.794000 audit: BPF prog-id=34 op=UNLOAD May 17 00:48:22.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.795000 audit: BPF prog-id=55 op=LOAD May 17 00:48:22.796000 audit: BPF prog-id=40 op=UNLOAD May 17 00:48:22.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.801000 audit: BPF prog-id=56 op=LOAD May 17 00:48:22.801000 audit: BPF prog-id=35 op=UNLOAD May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit: BPF prog-id=57 op=LOAD May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.802000 audit: BPF prog-id=58 op=LOAD May 17 00:48:22.802000 audit: BPF prog-id=36 op=UNLOAD May 17 00:48:22.802000 audit: BPF prog-id=37 op=UNLOAD May 17 00:48:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.803000 audit: BPF prog-id=59 op=LOAD May 17 00:48:22.803000 audit: BPF prog-id=38 op=UNLOAD May 17 00:48:22.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.805000 audit: BPF prog-id=60 op=LOAD May 17 00:48:22.805000 audit: BPF prog-id=39 op=UNLOAD May 17 00:48:22.836135 systemd[1]: Started kubelet.service. May 17 00:48:22.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.839874 systemd[1]: Stopping kubelet.service... May 17 00:48:22.841378 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:48:22.841857 systemd[1]: Stopped kubelet.service. May 17 00:48:22.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:22.845859 systemd[1]: Starting kubelet.service... May 17 00:48:22.979843 systemd[1]: Started kubelet.service. May 17 00:48:22.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:23.045904 kubelet[1606]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:23.046472 kubelet[1606]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:48:23.046578 kubelet[1606]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:23.047210 kubelet[1606]: I0517 00:48:23.047132 1606 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:48:23.577685 kubelet[1606]: I0517 00:48:23.577615 1606 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:48:23.577937 kubelet[1606]: I0517 00:48:23.577916 1606 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:48:23.578542 kubelet[1606]: I0517 00:48:23.578503 1606 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:48:23.628325 kubelet[1606]: E0517 00:48:23.628257 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://24.199.117.67:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:23.633507 kubelet[1606]: I0517 00:48:23.633241 1606 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:23.646175 kubelet[1606]: E0517 00:48:23.646131 1606 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:48:23.646412 kubelet[1606]: I0517 00:48:23.646389 1606 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:48:23.652290 kubelet[1606]: I0517 00:48:23.652247 1606 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:48:23.653750 kubelet[1606]: I0517 00:48:23.653696 1606 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:48:23.654172 kubelet[1606]: I0517 00:48:23.654130 1606 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:48:23.654541 kubelet[1606]: I0517 00:48:23.654250 1606 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-f656071047","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:48:23.654769 kubelet[1606]: I0517 00:48:23.654751 1606 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:48:23.654862 kubelet[1606]: I0517 00:48:23.654848 1606 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:48:23.655133 kubelet[1606]: I0517 00:48:23.655114 1606 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:23.663965 kubelet[1606]: I0517 00:48:23.663900 1606 kubelet.go:408] "Attempting to sync node with API server" May 17 00:48:23.664430 kubelet[1606]: I0517 00:48:23.664400 1606 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:48:23.664648 kubelet[1606]: I0517 00:48:23.664632 1606 kubelet.go:314] "Adding apiserver pod source" May 17 00:48:23.664801 kubelet[1606]: I0517 00:48:23.664784 1606 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:48:23.665736 kubelet[1606]: W0517 00:48:23.665482 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://24.199.117.67:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f656071047&limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:23.665736 kubelet[1606]: E0517 00:48:23.665565 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://24.199.117.67:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f656071047&limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:23.669004 kubelet[1606]: I0517 00:48:23.668971 1606 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:48:23.669848 kubelet[1606]: I0517 00:48:23.669818 1606 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:48:23.670084 kubelet[1606]: W0517 00:48:23.670067 1606 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:48:23.672994 kubelet[1606]: I0517 00:48:23.672947 1606 server.go:1274] "Started kubelet" May 17 00:48:23.673455 kubelet[1606]: W0517 00:48:23.673398 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://24.199.117.67:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:23.673644 kubelet[1606]: E0517 00:48:23.673582 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://24.199.117.67:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:23.675418 kubelet[1606]: I0517 00:48:23.674752 1606 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:48:23.677071 kubelet[1606]: I0517 00:48:23.676391 1606 server.go:449] "Adding debug handlers to kubelet server" May 17 00:48:23.684000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:23.684000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:23.684000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000abfd10 a1=c000be67e0 a2=c000abfce0 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.684000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:23.684000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:23.684000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:23.684000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bda9e0 a1=c000be67f8 a2=c000abfda0 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.684000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:23.687918 kubelet[1606]: I0517 00:48:23.686473 1606 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:48:23.687918 kubelet[1606]: I0517 00:48:23.686550 1606 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:48:23.687918 kubelet[1606]: I0517 00:48:23.686668 1606 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:48:23.690000 audit[1618]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.690000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca0e886f0 a2=0 a3=7ffca0e886dc items=0 ppid=1606 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:23.693235 kubelet[1606]: I0517 00:48:23.693167 1606 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:48:23.693758 kubelet[1606]: I0517 00:48:23.693731 1606 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:48:23.692000 audit[1619]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.692000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2307f2b0 a2=0 a3=7fff2307f29c items=0 ppid=1606 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:48:23.698049 kubelet[1606]: E0517 00:48:23.695904 1606 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://24.199.117.67:6443/api/v1/namespaces/default/events\": dial tcp 24.199.117.67:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-f656071047.18402a1002b349c6 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-f656071047,UID:ci-3510.3.7-n-f656071047,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-f656071047,},FirstTimestamp:2025-05-17 00:48:23.672900038 +0000 UTC m=+0.684964346,LastTimestamp:2025-05-17 00:48:23.672900038 +0000 UTC m=+0.684964346,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-f656071047,}" May 17 00:48:23.699274 kubelet[1606]: I0517 00:48:23.699216 1606 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:48:23.705120 kubelet[1606]: I0517 00:48:23.705056 1606 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:48:23.705416 kubelet[1606]: E0517 00:48:23.705387 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-f656071047\" not found" May 17 00:48:23.708113 kubelet[1606]: I0517 00:48:23.708068 1606 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:48:23.708464 kubelet[1606]: I0517 00:48:23.708442 1606 reconciler.go:26] "Reconciler: start to sync state" May 17 00:48:23.713862 kubelet[1606]: W0517 00:48:23.709451 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://24.199.117.67:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:23.713862 kubelet[1606]: E0517 00:48:23.709549 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://24.199.117.67:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:23.713862 kubelet[1606]: E0517 00:48:23.710059 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://24.199.117.67:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f656071047?timeout=10s\": dial tcp 24.199.117.67:6443: connect: connection refused" interval="200ms" May 17 00:48:23.713862 kubelet[1606]: I0517 00:48:23.710352 1606 factory.go:221] Registration of the systemd container factory successfully May 17 00:48:23.713862 kubelet[1606]: I0517 00:48:23.710529 1606 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:48:23.714000 audit[1621]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.714000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe165395f0 a2=0 a3=7ffe165395dc items=0 ppid=1606 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:23.718441 kubelet[1606]: I0517 00:48:23.716371 1606 factory.go:221] Registration of the containerd container factory successfully May 17 00:48:23.723000 audit[1624]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.723000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1a8c6830 a2=0 a3=7ffe1a8c681c items=0 ppid=1606 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:23.741398 kubelet[1606]: E0517 00:48:23.741331 1606 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:48:23.742000 audit[1627]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.742000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe2e07fcc0 a2=0 a3=7ffe2e07fcac items=0 ppid=1606 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:48:23.744527 kubelet[1606]: I0517 00:48:23.744471 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:48:23.744000 audit[1628]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.744000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf51452b0 a2=0 a3=7ffdf514529c items=0 ppid=1606 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:23.747000 audit[1630]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.747000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0df2bfc0 a2=0 a3=7ffc0df2bfac items=0 ppid=1606 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:23.750725 kubelet[1606]: I0517 00:48:23.750682 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:48:23.750000 audit[1631]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.750000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca55eea0 a2=0 a3=7ffcca55ee8c items=0 ppid=1606 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:23.752479 kubelet[1606]: I0517 00:48:23.752445 1606 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:48:23.752635 kubelet[1606]: I0517 00:48:23.752496 1606 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:48:23.752635 kubelet[1606]: E0517 00:48:23.752566 1606 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:48:23.754695 kubelet[1606]: W0517 00:48:23.754643 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://24.199.117.67:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:23.754000 audit[1634]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.754000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7728f5e0 a2=0 a3=7ffc7728f5cc items=0 ppid=1606 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:23.756572 kubelet[1606]: E0517 00:48:23.756543 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://24.199.117.67:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:23.756000 audit[1635]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.756000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffffcd1dd70 a2=0 a3=7ffffcd1dd5c items=0 ppid=1606 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:23.759760 kubelet[1606]: I0517 00:48:23.759729 1606 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:48:23.759760 kubelet[1606]: I0517 00:48:23.759755 1606 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:48:23.759889 kubelet[1606]: I0517 00:48:23.759788 1606 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:23.758000 audit[1637]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.758000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb2866cb0 a2=0 a3=7ffcb2866c9c items=0 ppid=1606 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:23.761670 kubelet[1606]: I0517 00:48:23.761639 1606 policy_none.go:49] "None policy: Start" May 17 00:48:23.762618 kubelet[1606]: I0517 00:48:23.762560 1606 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:48:23.762618 kubelet[1606]: I0517 00:48:23.762613 1606 state_mem.go:35] "Initializing new in-memory state store" May 17 00:48:23.761000 audit[1638]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.761000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2e1425e0 a2=0 a3=7ffd2e1425cc items=0 ppid=1606 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:23.768664 systemd[1]: Created slice kubepods.slice. May 17 00:48:23.774719 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:48:23.779483 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:48:23.786051 kubelet[1606]: I0517 00:48:23.786015 1606 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:48:23.784000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:23.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:23.784000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005efe60 a1=c000aa3920 a2=c0005efe00 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.784000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:23.787310 kubelet[1606]: I0517 00:48:23.787149 1606 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:48:23.788644 kubelet[1606]: I0517 00:48:23.788619 1606 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:48:23.788906 kubelet[1606]: I0517 00:48:23.788828 1606 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:48:23.789549 kubelet[1606]: I0517 00:48:23.789531 1606 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:48:23.792921 kubelet[1606]: E0517 00:48:23.792895 1606 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-f656071047\" not found" May 17 00:48:23.863241 systemd[1]: Created slice kubepods-burstable-podfa68935223d57431f071487070021e98.slice. May 17 00:48:23.876718 systemd[1]: Created slice kubepods-burstable-pod809629adda35b019b0f490eb74e1246b.slice. May 17 00:48:23.882966 systemd[1]: Created slice kubepods-burstable-podf0a59d4b68ed083fb7977ac62a67dade.slice. May 17 00:48:23.890835 kubelet[1606]: I0517 00:48:23.890765 1606 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:23.891344 kubelet[1606]: E0517 00:48:23.891312 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://24.199.117.67:6443/api/v1/nodes\": dial tcp 24.199.117.67:6443: connect: connection refused" node="ci-3510.3.7-n-f656071047" May 17 00:48:23.909103 kubelet[1606]: I0517 00:48:23.909040 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f0a59d4b68ed083fb7977ac62a67dade-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-f656071047\" (UID: \"f0a59d4b68ed083fb7977ac62a67dade\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-f656071047" May 17 00:48:23.909103 kubelet[1606]: I0517 00:48:23.909084 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:23.909103 kubelet[1606]: I0517 00:48:23.909119 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:23.909404 kubelet[1606]: I0517 00:48:23.909141 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:23.909404 kubelet[1606]: I0517 00:48:23.909168 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:23.909404 kubelet[1606]: I0517 00:48:23.909191 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:23.909404 kubelet[1606]: I0517 00:48:23.909212 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:23.909404 kubelet[1606]: I0517 00:48:23.909241 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:23.909697 kubelet[1606]: I0517 00:48:23.909266 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:23.911038 kubelet[1606]: E0517 00:48:23.910982 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://24.199.117.67:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f656071047?timeout=10s\": dial tcp 24.199.117.67:6443: connect: connection refused" interval="400ms" May 17 00:48:24.093454 kubelet[1606]: I0517 00:48:24.093416 1606 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:24.094336 kubelet[1606]: E0517 00:48:24.094299 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://24.199.117.67:6443/api/v1/nodes\": dial tcp 24.199.117.67:6443: connect: connection refused" node="ci-3510.3.7-n-f656071047" May 17 00:48:24.175714 kubelet[1606]: E0517 00:48:24.174273 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:24.175901 env[1186]: time="2025-05-17T00:48:24.175297314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-f656071047,Uid:fa68935223d57431f071487070021e98,Namespace:kube-system,Attempt:0,}" May 17 00:48:24.182923 kubelet[1606]: E0517 00:48:24.182877 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:24.184459 env[1186]: time="2025-05-17T00:48:24.183882818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-f656071047,Uid:809629adda35b019b0f490eb74e1246b,Namespace:kube-system,Attempt:0,}" May 17 00:48:24.186630 kubelet[1606]: E0517 00:48:24.186566 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:24.187227 env[1186]: time="2025-05-17T00:48:24.187180033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-f656071047,Uid:f0a59d4b68ed083fb7977ac62a67dade,Namespace:kube-system,Attempt:0,}" May 17 00:48:24.313058 kubelet[1606]: E0517 00:48:24.312952 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://24.199.117.67:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f656071047?timeout=10s\": dial tcp 24.199.117.67:6443: connect: connection refused" interval="800ms" May 17 00:48:24.496775 kubelet[1606]: I0517 00:48:24.496577 1606 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:24.498213 kubelet[1606]: E0517 00:48:24.498139 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://24.199.117.67:6443/api/v1/nodes\": dial tcp 24.199.117.67:6443: connect: connection refused" node="ci-3510.3.7-n-f656071047" May 17 00:48:24.671889 kubelet[1606]: W0517 00:48:24.671767 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://24.199.117.67:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:24.671889 kubelet[1606]: E0517 00:48:24.671844 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://24.199.117.67:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:24.690619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4246070885.mount: Deactivated successfully. May 17 00:48:24.698929 env[1186]: time="2025-05-17T00:48:24.698851563Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.700547 env[1186]: time="2025-05-17T00:48:24.700484110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.703925 env[1186]: time="2025-05-17T00:48:24.703866514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.705419 env[1186]: time="2025-05-17T00:48:24.705367736Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.707515 env[1186]: time="2025-05-17T00:48:24.707455955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.708823 env[1186]: time="2025-05-17T00:48:24.708761564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.710693 env[1186]: time="2025-05-17T00:48:24.709900408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.712077 env[1186]: time="2025-05-17T00:48:24.712029756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.724769 env[1186]: time="2025-05-17T00:48:24.724705352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.733357 env[1186]: time="2025-05-17T00:48:24.733292345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.734829 env[1186]: time="2025-05-17T00:48:24.734776341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.740932 env[1186]: time="2025-05-17T00:48:24.740875526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.779466 env[1186]: time="2025-05-17T00:48:24.778965056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:24.779466 env[1186]: time="2025-05-17T00:48:24.779053681Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:24.779466 env[1186]: time="2025-05-17T00:48:24.779076104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:24.781214 env[1186]: time="2025-05-17T00:48:24.779432792Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01365725ab9327cefb797de787c62403d307b75efce53e393b405a3fd4bc4c51 pid=1653 runtime=io.containerd.runc.v2 May 17 00:48:24.783930 env[1186]: time="2025-05-17T00:48:24.783811739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:24.783930 env[1186]: time="2025-05-17T00:48:24.783867159Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:24.783930 env[1186]: time="2025-05-17T00:48:24.783884295Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:24.785406 env[1186]: time="2025-05-17T00:48:24.785301386Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/379b2c8cda50ad8df8b32fe66f3f7a718b56edaa770c6c6063ab689e773ea8ce pid=1655 runtime=io.containerd.runc.v2 May 17 00:48:24.797632 kubelet[1606]: W0517 00:48:24.797466 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://24.199.117.67:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:24.797632 kubelet[1606]: E0517 00:48:24.797541 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://24.199.117.67:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:24.805574 env[1186]: time="2025-05-17T00:48:24.805442935Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:24.805914 env[1186]: time="2025-05-17T00:48:24.805864770Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:24.806078 env[1186]: time="2025-05-17T00:48:24.806032572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:24.806571 env[1186]: time="2025-05-17T00:48:24.806510484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58db5c02dd81b4e679b157c7a41c967c7d9c06077fee6307f9c432caf8d43f82 pid=1679 runtime=io.containerd.runc.v2 May 17 00:48:24.809521 kubelet[1606]: W0517 00:48:24.809276 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://24.199.117.67:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:24.809521 kubelet[1606]: E0517 00:48:24.809374 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://24.199.117.67:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:24.840103 systemd[1]: Started cri-containerd-379b2c8cda50ad8df8b32fe66f3f7a718b56edaa770c6c6063ab689e773ea8ce.scope. May 17 00:48:24.846179 systemd[1]: Started cri-containerd-01365725ab9327cefb797de787c62403d307b75efce53e393b405a3fd4bc4c51.scope. May 17 00:48:24.874428 systemd[1]: Started cri-containerd-58db5c02dd81b4e679b157c7a41c967c7d9c06077fee6307f9c432caf8d43f82.scope. May 17 00:48:24.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.882000 audit: BPF prog-id=61 op=LOAD May 17 00:48:24.884000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.884000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1655 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396232633863646135306164386466386233326665363666336637 May 17 00:48:24.884000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.884000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1655 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396232633863646135306164386466386233326665363666336637 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.885000 audit: BPF prog-id=62 op=LOAD May 17 00:48:24.885000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000408350 items=0 ppid=1655 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396232633863646135306164386466386233326665363666336637 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.886000 audit: BPF prog-id=63 op=LOAD May 17 00:48:24.886000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000408398 items=0 ppid=1655 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396232633863646135306164386466386233326665363666336637 May 17 00:48:24.888000 audit: BPF prog-id=63 op=UNLOAD May 17 00:48:24.888000 audit: BPF prog-id=62 op=UNLOAD May 17 00:48:24.888000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.888000 audit: BPF prog-id=64 op=LOAD May 17 00:48:24.888000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0004087a8 items=0 ppid=1655 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396232633863646135306164386466386233326665363666336637 May 17 00:48:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.912000 audit: BPF prog-id=65 op=LOAD May 17 00:48:24.915000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.915000 audit[1674]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1653 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333635373235616239333237636566623739376465373837633632 May 17 00:48:24.915000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.915000 audit[1674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1653 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333635373235616239333237636566623739376465373837633632 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.916000 audit: BPF prog-id=66 op=LOAD May 17 00:48:24.916000 audit[1674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024d10 items=0 ppid=1653 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333635373235616239333237636566623739376465373837633632 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.917000 audit: BPF prog-id=67 op=LOAD May 17 00:48:24.917000 audit[1674]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024d58 items=0 ppid=1653 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333635373235616239333237636566623739376465373837633632 May 17 00:48:24.917000 audit: BPF prog-id=67 op=UNLOAD May 17 00:48:24.917000 audit: BPF prog-id=66 op=UNLOAD May 17 00:48:24.918000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { perfmon } for pid=1674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit[1674]: AVC avc: denied { bpf } for pid=1674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.918000 audit: BPF prog-id=68 op=LOAD May 17 00:48:24.918000 audit[1674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025168 items=0 ppid=1653 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333635373235616239333237636566623739376465373837633632 May 17 00:48:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.922000 audit: BPF prog-id=69 op=LOAD May 17 00:48:24.924000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.924000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1679 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646235633032646438316234653637396231353763376134316339 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1679 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646235633032646438316234653637396231353763376134316339 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.925000 audit: BPF prog-id=70 op=LOAD May 17 00:48:24.925000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001098a0 items=0 ppid=1679 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646235633032646438316234653637396231353763376134316339 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.926000 audit: BPF prog-id=71 op=LOAD May 17 00:48:24.926000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001098e8 items=0 ppid=1679 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646235633032646438316234653637396231353763376134316339 May 17 00:48:24.927000 audit: BPF prog-id=71 op=UNLOAD May 17 00:48:24.927000 audit: BPF prog-id=70 op=UNLOAD May 17 00:48:24.927000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.927000 audit: BPF prog-id=72 op=LOAD May 17 00:48:24.927000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000109cf8 items=0 ppid=1679 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646235633032646438316234653637396231353763376134316339 May 17 00:48:24.937464 kubelet[1606]: W0517 00:48:24.937299 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://24.199.117.67:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f656071047&limit=500&resourceVersion=0": dial tcp 24.199.117.67:6443: connect: connection refused May 17 00:48:24.937464 kubelet[1606]: E0517 00:48:24.937396 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://24.199.117.67:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f656071047&limit=500&resourceVersion=0\": dial tcp 24.199.117.67:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:24.978889 env[1186]: time="2025-05-17T00:48:24.978832847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-f656071047,Uid:fa68935223d57431f071487070021e98,Namespace:kube-system,Attempt:0,} returns sandbox id \"379b2c8cda50ad8df8b32fe66f3f7a718b56edaa770c6c6063ab689e773ea8ce\"" May 17 00:48:24.983242 kubelet[1606]: E0517 00:48:24.982855 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:24.991156 env[1186]: time="2025-05-17T00:48:24.991093852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-f656071047,Uid:809629adda35b019b0f490eb74e1246b,Namespace:kube-system,Attempt:0,} returns sandbox id \"01365725ab9327cefb797de787c62403d307b75efce53e393b405a3fd4bc4c51\"" May 17 00:48:24.993501 kubelet[1606]: E0517 00:48:24.993108 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:24.995552 env[1186]: time="2025-05-17T00:48:24.995490814Z" level=info msg="CreateContainer within sandbox \"379b2c8cda50ad8df8b32fe66f3f7a718b56edaa770c6c6063ab689e773ea8ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:48:24.997525 env[1186]: time="2025-05-17T00:48:24.997451062Z" level=info msg="CreateContainer within sandbox \"01365725ab9327cefb797de787c62403d307b75efce53e393b405a3fd4bc4c51\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:48:25.019425 env[1186]: time="2025-05-17T00:48:25.019332204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-f656071047,Uid:f0a59d4b68ed083fb7977ac62a67dade,Namespace:kube-system,Attempt:0,} returns sandbox id \"58db5c02dd81b4e679b157c7a41c967c7d9c06077fee6307f9c432caf8d43f82\"" May 17 00:48:25.019920 env[1186]: time="2025-05-17T00:48:25.019792888Z" level=info msg="CreateContainer within sandbox \"379b2c8cda50ad8df8b32fe66f3f7a718b56edaa770c6c6063ab689e773ea8ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"fbfb356aa0b1473ec556e1bd96d4799a251e0d50ea2a932bdbf307b1d6b05cde\"" May 17 00:48:25.021535 env[1186]: time="2025-05-17T00:48:25.021488990Z" level=info msg="StartContainer for \"fbfb356aa0b1473ec556e1bd96d4799a251e0d50ea2a932bdbf307b1d6b05cde\"" May 17 00:48:25.022196 kubelet[1606]: E0517 00:48:25.021970 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:25.023820 env[1186]: time="2025-05-17T00:48:25.023774276Z" level=info msg="CreateContainer within sandbox \"01365725ab9327cefb797de787c62403d307b75efce53e393b405a3fd4bc4c51\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e3e4d06c67c6642ddb5d256439d0e3131a24ecbfd7b7f9a737863b0d68c677bd\"" May 17 00:48:25.026893 env[1186]: time="2025-05-17T00:48:25.026829923Z" level=info msg="CreateContainer within sandbox \"58db5c02dd81b4e679b157c7a41c967c7d9c06077fee6307f9c432caf8d43f82\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:48:25.027660 env[1186]: time="2025-05-17T00:48:25.027212837Z" level=info msg="StartContainer for \"e3e4d06c67c6642ddb5d256439d0e3131a24ecbfd7b7f9a737863b0d68c677bd\"" May 17 00:48:25.050647 env[1186]: time="2025-05-17T00:48:25.050462329Z" level=info msg="CreateContainer within sandbox \"58db5c02dd81b4e679b157c7a41c967c7d9c06077fee6307f9c432caf8d43f82\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7dd792d332fe9d2d0a0beb6b9882aaaf47596506d0a7f9ad7cb390bbffe6a6d5\"" May 17 00:48:25.059726 env[1186]: time="2025-05-17T00:48:25.059665878Z" level=info msg="StartContainer for \"7dd792d332fe9d2d0a0beb6b9882aaaf47596506d0a7f9ad7cb390bbffe6a6d5\"" May 17 00:48:25.067904 systemd[1]: Started cri-containerd-fbfb356aa0b1473ec556e1bd96d4799a251e0d50ea2a932bdbf307b1d6b05cde.scope. May 17 00:48:25.090735 systemd[1]: Started cri-containerd-e3e4d06c67c6642ddb5d256439d0e3131a24ecbfd7b7f9a737863b0d68c677bd.scope. May 17 00:48:25.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.101000 audit: BPF prog-id=73 op=LOAD May 17 00:48:25.102000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.102000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1655 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666233353661613062313437336563353536653162643936643437 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1655 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666233353661613062313437336563353536653162643936643437 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.103000 audit: BPF prog-id=74 op=LOAD May 17 00:48:25.103000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003085d0 items=0 ppid=1655 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666233353661613062313437336563353536653162643936643437 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.104000 audit: BPF prog-id=75 op=LOAD May 17 00:48:25.104000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000308618 items=0 ppid=1655 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666233353661613062313437336563353536653162643936643437 May 17 00:48:25.105000 audit: BPF prog-id=75 op=UNLOAD May 17 00:48:25.105000 audit: BPF prog-id=74 op=UNLOAD May 17 00:48:25.105000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.105000 audit: BPF prog-id=76 op=LOAD May 17 00:48:25.105000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000308a28 items=0 ppid=1655 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666233353661613062313437336563353536653162643936643437 May 17 00:48:25.115244 kubelet[1606]: E0517 00:48:25.115167 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://24.199.117.67:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f656071047?timeout=10s\": dial tcp 24.199.117.67:6443: connect: connection refused" interval="1.6s" May 17 00:48:25.121625 systemd[1]: Started cri-containerd-7dd792d332fe9d2d0a0beb6b9882aaaf47596506d0a7f9ad7cb390bbffe6a6d5.scope. May 17 00:48:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.138000 audit: BPF prog-id=77 op=LOAD May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653464303663363763363634326464623564323536343339643065 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1653 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653464303663363763363634326464623564323536343339643065 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit: BPF prog-id=78 op=LOAD May 17 00:48:25.139000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000299290 items=0 ppid=1653 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653464303663363763363634326464623564323536343339643065 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit: BPF prog-id=79 op=LOAD May 17 00:48:25.139000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002992d8 items=0 ppid=1653 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653464303663363763363634326464623564323536343339643065 May 17 00:48:25.139000 audit: BPF prog-id=79 op=UNLOAD May 17 00:48:25.139000 audit: BPF prog-id=78 op=UNLOAD May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.139000 audit: BPF prog-id=80 op=LOAD May 17 00:48:25.139000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002996e8 items=0 ppid=1653 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653464303663363763363634326464623564323536343339643065 May 17 00:48:25.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.165000 audit: BPF prog-id=81 op=LOAD May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1679 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764643739326433333266653964326430613062656236623938383261 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1679 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764643739326433333266653964326430613062656236623938383261 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit: BPF prog-id=82 op=LOAD May 17 00:48:25.166000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd30 items=0 ppid=1679 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764643739326433333266653964326430613062656236623938383261 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.166000 audit: BPF prog-id=83 op=LOAD May 17 00:48:25.166000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd78 items=0 ppid=1679 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764643739326433333266653964326430613062656236623938383261 May 17 00:48:25.167000 audit: BPF prog-id=83 op=UNLOAD May 17 00:48:25.167000 audit: BPF prog-id=82 op=UNLOAD May 17 00:48:25.167000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:25.167000 audit: BPF prog-id=84 op=LOAD May 17 00:48:25.167000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4188 items=0 ppid=1679 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764643739326433333266653964326430613062656236623938383261 May 17 00:48:25.225181 env[1186]: time="2025-05-17T00:48:25.225124202Z" level=info msg="StartContainer for \"fbfb356aa0b1473ec556e1bd96d4799a251e0d50ea2a932bdbf307b1d6b05cde\" returns successfully" May 17 00:48:25.238861 env[1186]: time="2025-05-17T00:48:25.238795031Z" level=info msg="StartContainer for \"e3e4d06c67c6642ddb5d256439d0e3131a24ecbfd7b7f9a737863b0d68c677bd\" returns successfully" May 17 00:48:25.251156 env[1186]: time="2025-05-17T00:48:25.251099458Z" level=info msg="StartContainer for \"7dd792d332fe9d2d0a0beb6b9882aaaf47596506d0a7f9ad7cb390bbffe6a6d5\" returns successfully" May 17 00:48:25.301452 kubelet[1606]: I0517 00:48:25.300835 1606 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:25.301452 kubelet[1606]: E0517 00:48:25.301298 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://24.199.117.67:6443/api/v1/nodes\": dial tcp 24.199.117.67:6443: connect: connection refused" node="ci-3510.3.7-n-f656071047" May 17 00:48:25.767005 kubelet[1606]: E0517 00:48:25.766862 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:25.773185 kubelet[1606]: E0517 00:48:25.773141 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:25.778900 kubelet[1606]: E0517 00:48:25.778863 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:26.779332 kubelet[1606]: E0517 00:48:26.779284 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:26.905008 kubelet[1606]: I0517 00:48:26.904955 1606 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:27.129000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.129000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003d7560 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:27.129000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:27.131000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.131000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007863e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:27.131000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:27.859000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.862268 kernel: kauditd_printk_skb: 563 callbacks suppressed May 17 00:48:27.862367 kernel: audit: type=1400 audit(1747442907.859:574): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.859000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0035ac210 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.870608 kernel: audit: type=1300 audit(1747442907.859:574): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0035ac210 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.870777 kernel: audit: type=1327 audit(1747442907.859:574): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.859000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.859000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.878787 kernel: audit: type=1400 audit(1747442907.859:575): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.878965 kernel: audit: type=1300 audit(1747442907.859:575): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00331cd40 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.859000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00331cd40 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.859000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.887770 kernel: audit: type=1327 audit(1747442907.859:575): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.887920 kernel: audit: type=1400 audit(1747442907.861:576): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.861000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.861000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003620300 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.895095 kernel: audit: type=1300 audit(1747442907.861:576): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003620300 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.895257 kernel: audit: type=1327 audit(1747442907.861:576): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.898000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.898000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0035ac840 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.903774 kernel: audit: type=1400 audit(1747442907.898:577): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.898000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.916000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.916000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0040164a0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:27.917000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:27.917000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0029d8900 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:48:27.917000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:48:28.095752 kubelet[1606]: E0517 00:48:28.095692 1606 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-f656071047\" not found" node="ci-3510.3.7-n-f656071047" May 17 00:48:28.190751 kubelet[1606]: I0517 00:48:28.190580 1606 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-f656071047" May 17 00:48:28.190751 kubelet[1606]: E0517 00:48:28.190657 1606 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-f656071047\": node \"ci-3510.3.7-n-f656071047\" not found" May 17 00:48:28.668984 kubelet[1606]: I0517 00:48:28.668821 1606 apiserver.go:52] "Watching apiserver" May 17 00:48:28.708907 kubelet[1606]: I0517 00:48:28.708794 1606 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:48:29.487948 kubelet[1606]: W0517 00:48:29.487900 1606 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:29.488468 kubelet[1606]: E0517 00:48:29.488285 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:29.785338 kubelet[1606]: E0517 00:48:29.785160 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:30.164104 kubelet[1606]: W0517 00:48:30.164058 1606 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:30.165014 kubelet[1606]: E0517 00:48:30.164959 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:30.451527 systemd[1]: Reloading. May 17 00:48:30.574148 /usr/lib/systemd/system-generators/torcx-generator[1899]: time="2025-05-17T00:48:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:48:30.574187 /usr/lib/systemd/system-generators/torcx-generator[1899]: time="2025-05-17T00:48:30Z" level=info msg="torcx already run" May 17 00:48:30.704325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:48:30.704354 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:48:30.731147 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:48:30.786869 kubelet[1606]: E0517 00:48:30.786819 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit: BPF prog-id=85 op=LOAD May 17 00:48:30.855000 audit: BPF prog-id=46 op=UNLOAD May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit: BPF prog-id=86 op=LOAD May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.856000 audit: BPF prog-id=87 op=LOAD May 17 00:48:30.856000 audit: BPF prog-id=47 op=UNLOAD May 17 00:48:30.856000 audit: BPF prog-id=48 op=UNLOAD May 17 00:48:30.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.859000 audit: BPF prog-id=88 op=LOAD May 17 00:48:30.860000 audit: BPF prog-id=49 op=UNLOAD May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit: BPF prog-id=89 op=LOAD May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit: BPF prog-id=90 op=LOAD May 17 00:48:30.860000 audit: BPF prog-id=50 op=UNLOAD May 17 00:48:30.860000 audit: BPF prog-id=51 op=UNLOAD May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.861000 audit: BPF prog-id=91 op=LOAD May 17 00:48:30.861000 audit: BPF prog-id=77 op=UNLOAD May 17 00:48:30.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit: BPF prog-id=92 op=LOAD May 17 00:48:30.863000 audit: BPF prog-id=61 op=UNLOAD May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.863000 audit: BPF prog-id=93 op=LOAD May 17 00:48:30.863000 audit: BPF prog-id=52 op=UNLOAD May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit: BPF prog-id=94 op=LOAD May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.864000 audit: BPF prog-id=95 op=LOAD May 17 00:48:30.864000 audit: BPF prog-id=53 op=UNLOAD May 17 00:48:30.864000 audit: BPF prog-id=54 op=UNLOAD May 17 00:48:30.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.865000 audit: BPF prog-id=96 op=LOAD May 17 00:48:30.865000 audit: BPF prog-id=55 op=UNLOAD May 17 00:48:30.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.866000 audit: BPF prog-id=97 op=LOAD May 17 00:48:30.866000 audit: BPF prog-id=65 op=UNLOAD May 17 00:48:30.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit: BPF prog-id=98 op=LOAD May 17 00:48:30.869000 audit: BPF prog-id=81 op=UNLOAD May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.869000 audit: BPF prog-id=99 op=LOAD May 17 00:48:30.869000 audit: BPF prog-id=69 op=UNLOAD May 17 00:48:30.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit: BPF prog-id=100 op=LOAD May 17 00:48:30.872000 audit: BPF prog-id=56 op=UNLOAD May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit: BPF prog-id=101 op=LOAD May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.872000 audit: BPF prog-id=102 op=LOAD May 17 00:48:30.872000 audit: BPF prog-id=57 op=UNLOAD May 17 00:48:30.872000 audit: BPF prog-id=58 op=UNLOAD May 17 00:48:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.873000 audit: BPF prog-id=103 op=LOAD May 17 00:48:30.873000 audit: BPF prog-id=59 op=UNLOAD May 17 00:48:30.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.875000 audit: BPF prog-id=104 op=LOAD May 17 00:48:30.875000 audit: BPF prog-id=60 op=UNLOAD May 17 00:48:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:30.876000 audit: BPF prog-id=105 op=LOAD May 17 00:48:30.876000 audit: BPF prog-id=73 op=UNLOAD May 17 00:48:30.898855 kubelet[1606]: I0517 00:48:30.898659 1606 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:30.901718 systemd[1]: Stopping kubelet.service... May 17 00:48:30.920082 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:48:30.920295 systemd[1]: Stopped kubelet.service. May 17 00:48:30.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:30.920372 systemd[1]: kubelet.service: Consumed 1.170s CPU time. May 17 00:48:30.922759 systemd[1]: Starting kubelet.service... May 17 00:48:31.196000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:48:31.196000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000912480 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:31.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:32.139278 systemd[1]: Started kubelet.service. May 17 00:48:32.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:32.255904 kubelet[1950]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:32.255904 kubelet[1950]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:48:32.255904 kubelet[1950]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:32.255904 kubelet[1950]: I0517 00:48:32.250645 1950 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:48:32.286712 kubelet[1950]: I0517 00:48:32.286615 1950 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:48:32.286712 kubelet[1950]: I0517 00:48:32.286665 1950 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:48:32.309677 kubelet[1950]: I0517 00:48:32.309605 1950 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:48:32.313656 kubelet[1950]: I0517 00:48:32.313553 1950 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:48:32.318455 kubelet[1950]: I0517 00:48:32.318419 1950 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:32.338174 kubelet[1950]: E0517 00:48:32.338120 1950 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:48:32.338394 kubelet[1950]: I0517 00:48:32.338377 1950 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:48:32.341459 kubelet[1950]: I0517 00:48:32.341419 1950 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:48:32.341872 kubelet[1950]: I0517 00:48:32.341855 1950 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:48:32.342118 kubelet[1950]: I0517 00:48:32.342082 1950 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:48:32.342404 kubelet[1950]: I0517 00:48:32.342191 1950 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-f656071047","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:48:32.345480 kubelet[1950]: I0517 00:48:32.345442 1950 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:48:32.345793 kubelet[1950]: I0517 00:48:32.345776 1950 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:48:32.345981 kubelet[1950]: I0517 00:48:32.345966 1950 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:32.346297 kubelet[1950]: I0517 00:48:32.346283 1950 kubelet.go:408] "Attempting to sync node with API server" May 17 00:48:32.347353 kubelet[1950]: I0517 00:48:32.347328 1950 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:48:32.347545 kubelet[1950]: I0517 00:48:32.347530 1950 kubelet.go:314] "Adding apiserver pod source" May 17 00:48:32.349344 kubelet[1950]: I0517 00:48:32.349318 1950 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:48:32.363690 kubelet[1950]: I0517 00:48:32.363644 1950 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:48:32.368108 kubelet[1950]: I0517 00:48:32.367722 1950 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:48:32.393725 kubelet[1950]: I0517 00:48:32.393560 1950 server.go:1274] "Started kubelet" May 17 00:48:32.403000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.403000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:32.403000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037aff0 a1=c000ccc750 a2=c00037af90 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.403000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:32.403000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.403000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:32.403000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b67b60 a1=c000ccc768 a2=c00037b110 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.403000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:32.405713 kubelet[1950]: I0517 00:48:32.404506 1950 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:48:32.405713 kubelet[1950]: I0517 00:48:32.404558 1950 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:48:32.405713 kubelet[1950]: I0517 00:48:32.404622 1950 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:48:32.416193 kubelet[1950]: I0517 00:48:32.416114 1950 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:48:32.417389 kubelet[1950]: I0517 00:48:32.394566 1950 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:48:32.418186 kubelet[1950]: I0517 00:48:32.418122 1950 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:48:32.418819 kubelet[1950]: I0517 00:48:32.418800 1950 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:48:32.421232 kubelet[1950]: I0517 00:48:32.421202 1950 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:48:32.429735 kubelet[1950]: I0517 00:48:32.429093 1950 server.go:449] "Adding debug handlers to kubelet server" May 17 00:48:32.435785 kubelet[1950]: I0517 00:48:32.435737 1950 factory.go:221] Registration of the systemd container factory successfully May 17 00:48:32.440008 kubelet[1950]: I0517 00:48:32.439967 1950 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:48:32.440485 kubelet[1950]: I0517 00:48:32.440467 1950 reconciler.go:26] "Reconciler: start to sync state" May 17 00:48:32.441334 kubelet[1950]: I0517 00:48:32.441288 1950 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:48:32.449740 kubelet[1950]: I0517 00:48:32.449666 1950 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:48:32.451689 kubelet[1950]: I0517 00:48:32.451652 1950 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:48:32.458320 kubelet[1950]: I0517 00:48:32.458256 1950 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:48:32.458621 kubelet[1950]: I0517 00:48:32.458599 1950 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:48:32.458805 kubelet[1950]: E0517 00:48:32.458781 1950 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:48:32.475407 kubelet[1950]: E0517 00:48:32.475373 1950 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:48:32.478298 kubelet[1950]: I0517 00:48:32.476571 1950 factory.go:221] Registration of the containerd container factory successfully May 17 00:48:32.559304 kubelet[1950]: E0517 00:48:32.559263 1950 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:48:32.568942 kubelet[1950]: I0517 00:48:32.568908 1950 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:48:32.569266 kubelet[1950]: I0517 00:48:32.569243 1950 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:48:32.569420 kubelet[1950]: I0517 00:48:32.569403 1950 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:32.569790 kubelet[1950]: I0517 00:48:32.569770 1950 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:48:32.569914 kubelet[1950]: I0517 00:48:32.569885 1950 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:48:32.569974 kubelet[1950]: I0517 00:48:32.569965 1950 policy_none.go:49] "None policy: Start" May 17 00:48:32.571034 kubelet[1950]: I0517 00:48:32.571014 1950 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:48:32.571197 kubelet[1950]: I0517 00:48:32.571181 1950 state_mem.go:35] "Initializing new in-memory state store" May 17 00:48:32.571554 kubelet[1950]: I0517 00:48:32.571530 1950 state_mem.go:75] "Updated machine memory state" May 17 00:48:32.584270 kubelet[1950]: I0517 00:48:32.584225 1950 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:48:32.583000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.583000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:32.583000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000afed20 a1=c000a65fe0 a2=c000afecf0 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.583000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:32.585810 kubelet[1950]: I0517 00:48:32.585766 1950 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:48:32.586229 kubelet[1950]: I0517 00:48:32.586211 1950 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:48:32.586471 kubelet[1950]: I0517 00:48:32.586407 1950 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:48:32.588798 kubelet[1950]: I0517 00:48:32.588691 1950 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:48:32.697177 kubelet[1950]: I0517 00:48:32.696980 1950 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-f656071047" May 17 00:48:32.713058 kubelet[1950]: I0517 00:48:32.712985 1950 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.7-n-f656071047" May 17 00:48:32.713308 kubelet[1950]: I0517 00:48:32.713090 1950 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-f656071047" May 17 00:48:32.770977 kubelet[1950]: W0517 00:48:32.770930 1950 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:32.771974 kubelet[1950]: W0517 00:48:32.771940 1950 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:32.772161 kubelet[1950]: E0517 00:48:32.772007 1950 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.7-n-f656071047\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.775512 kubelet[1950]: W0517 00:48:32.775469 1950 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:32.775764 kubelet[1950]: E0517 00:48:32.775536 1950 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.7-n-f656071047\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f656071047" May 17 00:48:32.846817 kubelet[1950]: I0517 00:48:32.846762 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:32.846817 kubelet[1950]: I0517 00:48:32.846820 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.847131 kubelet[1950]: I0517 00:48:32.846861 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:32.847131 kubelet[1950]: I0517 00:48:32.846880 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.847131 kubelet[1950]: I0517 00:48:32.846898 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.847131 kubelet[1950]: I0517 00:48:32.846914 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.847131 kubelet[1950]: I0517 00:48:32.846933 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fa68935223d57431f071487070021e98-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-f656071047\" (UID: \"fa68935223d57431f071487070021e98\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" May 17 00:48:32.847374 kubelet[1950]: I0517 00:48:32.846948 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f0a59d4b68ed083fb7977ac62a67dade-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-f656071047\" (UID: \"f0a59d4b68ed083fb7977ac62a67dade\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-f656071047" May 17 00:48:32.847374 kubelet[1950]: I0517 00:48:32.846964 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/809629adda35b019b0f490eb74e1246b-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f656071047\" (UID: \"809629adda35b019b0f490eb74e1246b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:33.072442 kubelet[1950]: E0517 00:48:33.072300 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.074778 kubelet[1950]: E0517 00:48:33.073005 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.076165 kubelet[1950]: E0517 00:48:33.076125 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.356150 kubelet[1950]: I0517 00:48:33.355994 1950 apiserver.go:52] "Watching apiserver" May 17 00:48:33.441242 kubelet[1950]: I0517 00:48:33.441182 1950 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:48:33.516893 kubelet[1950]: E0517 00:48:33.516847 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.518424 kubelet[1950]: E0517 00:48:33.518391 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.526156 kubelet[1950]: W0517 00:48:33.526118 1950 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:48:33.526430 kubelet[1950]: E0517 00:48:33.526411 1950 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-f656071047\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" May 17 00:48:33.526714 kubelet[1950]: E0517 00:48:33.526696 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:33.560883 kubelet[1950]: I0517 00:48:33.560649 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f656071047" podStartSLOduration=1.560618849 podStartE2EDuration="1.560618849s" podCreationTimestamp="2025-05-17 00:48:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:33.549775812 +0000 UTC m=+1.390749075" watchObservedRunningTime="2025-05-17 00:48:33.560618849 +0000 UTC m=+1.401592133" May 17 00:48:33.570871 kubelet[1950]: I0517 00:48:33.570793 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f656071047" podStartSLOduration=4.5707645249999995 podStartE2EDuration="4.570764525s" podCreationTimestamp="2025-05-17 00:48:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:33.561638875 +0000 UTC m=+1.402612157" watchObservedRunningTime="2025-05-17 00:48:33.570764525 +0000 UTC m=+1.411737809" May 17 00:48:34.522915 kubelet[1950]: E0517 00:48:34.522857 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:34.808399 update_engine[1177]: I0517 00:48:34.807664 1177 update_attempter.cc:509] Updating boot flags... May 17 00:48:35.525491 kubelet[1950]: E0517 00:48:35.525447 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:35.686275 kernel: kauditd_printk_skb: 269 callbacks suppressed May 17 00:48:35.686516 kernel: audit: type=1400 audit(1747442915.681:830): avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.681000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.681000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001756f00 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.691949 kernel: audit: type=1300 audit(1747442915.681:830): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001756f00 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.696264 kernel: audit: type=1327 audit(1747442915.681:830): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.707000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.707000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d8c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.717598 kernel: audit: type=1400 audit(1747442915.707:831): avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.717850 kernel: audit: type=1300 audit(1747442915.707:831): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d8c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.724623 kernel: audit: type=1327 audit(1747442915.707:831): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.724820 kernel: audit: type=1400 audit(1747442915.707:832): avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.707000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.707000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d900 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.734015 kernel: audit: type=1300 audit(1747442915.707:832): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d900 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.734242 kernel: audit: type=1327 audit(1747442915.707:832): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.707000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.709000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.709000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191dfa0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:48:35.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:35.744634 kernel: audit: type=1400 audit(1747442915.709:833): avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:35.820021 kubelet[1950]: I0517 00:48:35.819872 1950 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:48:35.822166 env[1186]: time="2025-05-17T00:48:35.822086564Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:48:35.823202 kubelet[1950]: I0517 00:48:35.823171 1950 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:48:36.476239 kubelet[1950]: I0517 00:48:36.476122 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f656071047" podStartSLOduration=6.476067517 podStartE2EDuration="6.476067517s" podCreationTimestamp="2025-05-17 00:48:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:33.571948996 +0000 UTC m=+1.412922280" watchObservedRunningTime="2025-05-17 00:48:36.476067517 +0000 UTC m=+4.317040801" May 17 00:48:36.486554 systemd[1]: Created slice kubepods-besteffort-pod61ced70f_fb67_447a_8e52_e957847d3b0c.slice. May 17 00:48:36.572420 kubelet[1950]: I0517 00:48:36.572366 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/61ced70f-fb67-447a-8e52-e957847d3b0c-lib-modules\") pod \"kube-proxy-z5r82\" (UID: \"61ced70f-fb67-447a-8e52-e957847d3b0c\") " pod="kube-system/kube-proxy-z5r82" May 17 00:48:36.573276 kubelet[1950]: I0517 00:48:36.573235 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zqwsx\" (UniqueName: \"kubernetes.io/projected/61ced70f-fb67-447a-8e52-e957847d3b0c-kube-api-access-zqwsx\") pod \"kube-proxy-z5r82\" (UID: \"61ced70f-fb67-447a-8e52-e957847d3b0c\") " pod="kube-system/kube-proxy-z5r82" May 17 00:48:36.573487 kubelet[1950]: I0517 00:48:36.573468 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/61ced70f-fb67-447a-8e52-e957847d3b0c-kube-proxy\") pod \"kube-proxy-z5r82\" (UID: \"61ced70f-fb67-447a-8e52-e957847d3b0c\") " pod="kube-system/kube-proxy-z5r82" May 17 00:48:36.573672 kubelet[1950]: I0517 00:48:36.573648 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/61ced70f-fb67-447a-8e52-e957847d3b0c-xtables-lock\") pod \"kube-proxy-z5r82\" (UID: \"61ced70f-fb67-447a-8e52-e957847d3b0c\") " pod="kube-system/kube-proxy-z5r82" May 17 00:48:36.684102 kubelet[1950]: I0517 00:48:36.684037 1950 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:48:36.805338 kubelet[1950]: E0517 00:48:36.805206 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:36.806639 env[1186]: time="2025-05-17T00:48:36.806335440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z5r82,Uid:61ced70f-fb67-447a-8e52-e957847d3b0c,Namespace:kube-system,Attempt:0,}" May 17 00:48:36.830468 env[1186]: time="2025-05-17T00:48:36.830349461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:36.830468 env[1186]: time="2025-05-17T00:48:36.830468799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:36.831111 env[1186]: time="2025-05-17T00:48:36.830494121Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:36.831111 env[1186]: time="2025-05-17T00:48:36.830668851Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885 pid=2015 runtime=io.containerd.runc.v2 May 17 00:48:36.858783 systemd[1]: Started cri-containerd-102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885.scope. May 17 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.906000 audit: BPF prog-id=106 op=LOAD May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130326664383430616534326435346137303963383932356339623730 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130326664383430616534326435346137303963383932356339623730 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.908000 audit: BPF prog-id=107 op=LOAD May 17 00:48:36.908000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000224170 items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130326664383430616534326435346137303963383932356339623730 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit: BPF prog-id=108 op=LOAD May 17 00:48:36.909000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002241b8 items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130326664383430616534326435346137303963383932356339623730 May 17 00:48:36.909000 audit: BPF prog-id=108 op=UNLOAD May 17 00:48:36.909000 audit: BPF prog-id=107 op=UNLOAD May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.909000 audit: BPF prog-id=109 op=LOAD May 17 00:48:36.909000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002245c8 items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130326664383430616534326435346137303963383932356339623730 May 17 00:48:36.948768 env[1186]: time="2025-05-17T00:48:36.948706120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z5r82,Uid:61ced70f-fb67-447a-8e52-e957847d3b0c,Namespace:kube-system,Attempt:0,} returns sandbox id \"102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885\"" May 17 00:48:36.949950 kubelet[1950]: E0517 00:48:36.949907 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:36.954306 env[1186]: time="2025-05-17T00:48:36.954247987Z" level=info msg="CreateContainer within sandbox \"102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:48:36.975546 env[1186]: time="2025-05-17T00:48:36.975367767Z" level=info msg="CreateContainer within sandbox \"102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"949cad56f0413c6adf9354fd97959ff933ab774f69f82e094128b3ada1a9d656\"" May 17 00:48:36.980954 env[1186]: time="2025-05-17T00:48:36.980801120Z" level=info msg="StartContainer for \"949cad56f0413c6adf9354fd97959ff933ab774f69f82e094128b3ada1a9d656\"" May 17 00:48:36.982272 systemd[1]: Created slice kubepods-besteffort-pod9c836c18_feb8_4eac_b11a_349d919dbb6f.slice. May 17 00:48:37.018940 systemd[1]: Started cri-containerd-949cad56f0413c6adf9354fd97959ff933ab774f69f82e094128b3ada1a9d656.scope. May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe2245d45f8 items=0 ppid=2015 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934396361643536663034313363366164663933353466643937393539 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit: BPF prog-id=110 op=LOAD May 17 00:48:37.074000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000395ef8 items=0 ppid=2015 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934396361643536663034313363366164663933353466643937393539 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit: BPF prog-id=111 op=LOAD May 17 00:48:37.074000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000395f48 items=0 ppid=2015 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934396361643536663034313363366164663933353466643937393539 May 17 00:48:37.074000 audit: BPF prog-id=111 op=UNLOAD May 17 00:48:37.074000 audit: BPF prog-id=110 op=UNLOAD May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.074000 audit: BPF prog-id=112 op=LOAD May 17 00:48:37.074000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000395fd8 items=0 ppid=2015 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934396361643536663034313363366164663933353466643937393539 May 17 00:48:37.080797 kubelet[1950]: I0517 00:48:37.078167 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9c836c18-feb8-4eac-b11a-349d919dbb6f-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-8m8qr\" (UID: \"9c836c18-feb8-4eac-b11a-349d919dbb6f\") " pod="tigera-operator/tigera-operator-7c5755cdcb-8m8qr" May 17 00:48:37.080797 kubelet[1950]: I0517 00:48:37.078209 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6blv\" (UniqueName: \"kubernetes.io/projected/9c836c18-feb8-4eac-b11a-349d919dbb6f-kube-api-access-z6blv\") pod \"tigera-operator-7c5755cdcb-8m8qr\" (UID: \"9c836c18-feb8-4eac-b11a-349d919dbb6f\") " pod="tigera-operator/tigera-operator-7c5755cdcb-8m8qr" May 17 00:48:37.102793 env[1186]: time="2025-05-17T00:48:37.102710892Z" level=info msg="StartContainer for \"949cad56f0413c6adf9354fd97959ff933ab774f69f82e094128b3ada1a9d656\" returns successfully" May 17 00:48:37.287000 audit[2118]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.287000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd029a1070 a2=0 a3=7ffd029a105c items=0 ppid=2068 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:48:37.290785 env[1186]: time="2025-05-17T00:48:37.290722930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-8m8qr,Uid:9c836c18-feb8-4eac-b11a-349d919dbb6f,Namespace:tigera-operator,Attempt:0,}" May 17 00:48:37.289000 audit[2119]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.289000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd642af5a0 a2=0 a3=7ffd642af58c items=0 ppid=2068 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:48:37.292000 audit[2120]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.292000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7ce00440 a2=0 a3=7ffd7ce0042c items=0 ppid=2068 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:48:37.293000 audit[2121]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.293000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20eba5c0 a2=0 a3=7fff20eba5ac items=0 ppid=2068 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:48:37.296000 audit[2123]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.296000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd24351a90 a2=0 a3=7ffd24351a7c items=0 ppid=2068 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:48:37.299000 audit[2122]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.299000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7dde7b30 a2=0 a3=51744825ab840b4b items=0 ppid=2068 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:48:37.311542 env[1186]: time="2025-05-17T00:48:37.311417382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:37.311906 env[1186]: time="2025-05-17T00:48:37.311859382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:37.312051 env[1186]: time="2025-05-17T00:48:37.312019799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:37.312795 env[1186]: time="2025-05-17T00:48:37.312721573Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/369f44c44afafa58d187ea1a58668cd0f8bc997ef93a94505e16a4f2312a79cd pid=2131 runtime=io.containerd.runc.v2 May 17 00:48:37.337019 systemd[1]: Started cri-containerd-369f44c44afafa58d187ea1a58668cd0f8bc997ef93a94505e16a4f2312a79cd.scope. May 17 00:48:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.363000 audit: BPF prog-id=113 op=LOAD May 17 00:48:37.366000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.366000 audit[2143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396634346334346166616661353864313837656131613538363638 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396634346334346166616661353864313837656131613538363638 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.367000 audit: BPF prog-id=114 op=LOAD May 17 00:48:37.367000 audit[2143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000323a50 items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396634346334346166616661353864313837656131613538363638 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.368000 audit: BPF prog-id=115 op=LOAD May 17 00:48:37.368000 audit[2143]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000323a98 items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396634346334346166616661353864313837656131613538363638 May 17 00:48:37.369000 audit: BPF prog-id=115 op=UNLOAD May 17 00:48:37.369000 audit: BPF prog-id=114 op=UNLOAD May 17 00:48:37.369000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { perfmon } for pid=2143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit[2143]: AVC avc: denied { bpf } for pid=2143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.369000 audit: BPF prog-id=116 op=LOAD May 17 00:48:37.369000 audit[2143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000323ea8 items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396634346334346166616661353864313837656131613538363638 May 17 00:48:37.405000 audit[2160]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.405000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff348c1e90 a2=0 a3=7fff348c1e7c items=0 ppid=2068 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:48:37.415951 env[1186]: time="2025-05-17T00:48:37.415881412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-8m8qr,Uid:9c836c18-feb8-4eac-b11a-349d919dbb6f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"369f44c44afafa58d187ea1a58668cd0f8bc997ef93a94505e16a4f2312a79cd\"" May 17 00:48:37.415000 audit[2168]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.415000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd66eb8650 a2=0 a3=7ffd66eb863c items=0 ppid=2068 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:48:37.422031 env[1186]: time="2025-05-17T00:48:37.419977604Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:48:37.429000 audit[2171]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.429000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff90b2c010 a2=0 a3=7fff90b2bffc items=0 ppid=2068 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:48:37.431000 audit[2172]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.431000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffd3c0d00 a2=0 a3=7ffffd3c0cec items=0 ppid=2068 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:48:37.435000 audit[2174]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.435000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffbe289690 a2=0 a3=7fffbe28967c items=0 ppid=2068 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:48:37.438000 audit[2175]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.438000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffba800220 a2=0 a3=7fffba80020c items=0 ppid=2068 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:48:37.442000 audit[2177]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.442000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2f68cda0 a2=0 a3=7ffc2f68cd8c items=0 ppid=2068 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:48:37.449000 audit[2180]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.449000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdfadb8710 a2=0 a3=7ffdfadb86fc items=0 ppid=2068 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:48:37.453000 audit[2181]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.453000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7c7969a0 a2=0 a3=7ffc7c79698c items=0 ppid=2068 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:48:37.459000 audit[2183]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.459000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd35eaf730 a2=0 a3=7ffd35eaf71c items=0 ppid=2068 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:48:37.461000 audit[2184]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.461000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc85902d30 a2=0 a3=7ffc85902d1c items=0 ppid=2068 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:48:37.465000 audit[2186]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.465000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce49a9ed0 a2=0 a3=7ffce49a9ebc items=0 ppid=2068 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:37.476000 audit[2189]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.476000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1380fb80 a2=0 a3=7ffc1380fb6c items=0 ppid=2068 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:37.484000 audit[2192]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.484000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3612f920 a2=0 a3=7ffe3612f90c items=0 ppid=2068 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:48:37.488000 audit[2193]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.488000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9cabd850 a2=0 a3=7ffc9cabd83c items=0 ppid=2068 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:48:37.492000 audit[2195]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.492000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc6f9fe930 a2=0 a3=7ffc6f9fe91c items=0 ppid=2068 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:37.506000 audit[2198]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.506000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc800ebc20 a2=0 a3=7ffc800ebc0c items=0 ppid=2068 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:37.509000 audit[2199]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.509000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc45234ac0 a2=0 a3=7ffc45234aac items=0 ppid=2068 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:48:37.514000 audit[2201]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:37.514000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe1a91e600 a2=0 a3=7ffe1a91e5ec items=0 ppid=2068 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:48:37.533533 kubelet[1950]: E0517 00:48:37.533478 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:37.567000 audit[2207]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.567000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdc9ba0410 a2=0 a3=7ffdc9ba03fc items=0 ppid=2068 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:37.580000 audit[2207]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.580000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdc9ba0410 a2=0 a3=7ffdc9ba03fc items=0 ppid=2068 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:37.586000 audit[2212]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.586000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc5a0f27a0 a2=0 a3=7ffc5a0f278c items=0 ppid=2068 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:48:37.592000 audit[2214]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.592000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0d205510 a2=0 a3=7ffe0d2054fc items=0 ppid=2068 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:48:37.598000 audit[2217]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.598000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff227b6780 a2=0 a3=7fff227b676c items=0 ppid=2068 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:48:37.601000 audit[2218]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.601000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff97bed350 a2=0 a3=7fff97bed33c items=0 ppid=2068 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:48:37.607000 audit[2220]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.607000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff26674d60 a2=0 a3=7fff26674d4c items=0 ppid=2068 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:48:37.609000 audit[2221]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.609000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc28630cd0 a2=0 a3=7ffc28630cbc items=0 ppid=2068 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:48:37.614000 audit[2223]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.614000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce1b98220 a2=0 a3=7ffce1b9820c items=0 ppid=2068 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:48:37.620000 audit[2226]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.620000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff45540700 a2=0 a3=7fff455406ec items=0 ppid=2068 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:48:37.622000 audit[2227]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.622000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe747dbb00 a2=0 a3=7ffe747dbaec items=0 ppid=2068 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:48:37.628000 audit[2229]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.628000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd57d82fb0 a2=0 a3=7ffd57d82f9c items=0 ppid=2068 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:48:37.631000 audit[2230]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.631000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd844e2c70 a2=0 a3=7ffd844e2c5c items=0 ppid=2068 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:48:37.635000 audit[2232]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.635000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe72347a00 a2=0 a3=7ffe723479ec items=0 ppid=2068 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:37.642000 audit[2235]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.642000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3d2d6690 a2=0 a3=7ffe3d2d667c items=0 ppid=2068 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:48:37.649000 audit[2238]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.649000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeae249380 a2=0 a3=7ffeae24936c items=0 ppid=2068 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:48:37.651000 audit[2239]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.651000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb04bfce0 a2=0 a3=7ffdb04bfccc items=0 ppid=2068 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:48:37.654000 audit[2241]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.654000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe4c53d3c0 a2=0 a3=7ffe4c53d3ac items=0 ppid=2068 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:37.660000 audit[2244]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.660000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0089a7b0 a2=0 a3=7ffd0089a79c items=0 ppid=2068 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:37.662000 audit[2245]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.662000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8781bea0 a2=0 a3=7ffe8781be8c items=0 ppid=2068 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:48:37.667000 audit[2247]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.667000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3855a160 a2=0 a3=7ffc3855a14c items=0 ppid=2068 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:48:37.670000 audit[2248]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.670000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe966e4160 a2=0 a3=7ffe966e414c items=0 ppid=2068 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:48:37.675000 audit[2250]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.675000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd80edf540 a2=0 a3=7ffd80edf52c items=0 ppid=2068 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:37.681000 audit[2253]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:37.681000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe40000410 a2=0 a3=7ffe400003fc items=0 ppid=2068 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:37.695420 systemd[1]: run-containerd-runc-k8s.io-102fd840ae42d54a709c8925c9b70caf5ff10c06754a0799794ef19ea2d93885-runc.LJz1xP.mount: Deactivated successfully. May 17 00:48:37.701000 audit[2255]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:48:37.701000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd89427000 a2=0 a3=7ffd89426fec items=0 ppid=2068 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.701000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:37.703000 audit[2255]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:48:37.703000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd89427000 a2=0 a3=7ffd89426fec items=0 ppid=2068 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.703000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:38.753281 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3184899272.mount: Deactivated successfully. May 17 00:48:39.194242 kubelet[1950]: E0517 00:48:39.194115 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:39.223322 kubelet[1950]: I0517 00:48:39.223230 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-z5r82" podStartSLOduration=3.223176064 podStartE2EDuration="3.223176064s" podCreationTimestamp="2025-05-17 00:48:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:37.549374379 +0000 UTC m=+5.390347653" watchObservedRunningTime="2025-05-17 00:48:39.223176064 +0000 UTC m=+7.064149351" May 17 00:48:39.539154 kubelet[1950]: E0517 00:48:39.538844 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:40.597826 kubelet[1950]: E0517 00:48:40.597780 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:41.545108 kubelet[1950]: E0517 00:48:41.544781 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:42.188521 env[1186]: time="2025-05-17T00:48:42.188449116Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:42.191746 env[1186]: time="2025-05-17T00:48:42.191685450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:42.194942 env[1186]: time="2025-05-17T00:48:42.194857707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:42.198024 env[1186]: time="2025-05-17T00:48:42.197951732Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:42.199832 env[1186]: time="2025-05-17T00:48:42.199012968Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:48:42.207816 env[1186]: time="2025-05-17T00:48:42.207751665Z" level=info msg="CreateContainer within sandbox \"369f44c44afafa58d187ea1a58668cd0f8bc997ef93a94505e16a4f2312a79cd\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:48:42.216674 kubelet[1950]: E0517 00:48:42.214541 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:42.225322 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount869204558.mount: Deactivated successfully. May 17 00:48:42.242268 env[1186]: time="2025-05-17T00:48:42.239223389Z" level=info msg="CreateContainer within sandbox \"369f44c44afafa58d187ea1a58668cd0f8bc997ef93a94505e16a4f2312a79cd\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a0f5c0f1a1b2436bda125cb2f70f44e735c4690618a5a0036bebbbf756ba8474\"" May 17 00:48:42.242268 env[1186]: time="2025-05-17T00:48:42.240307425Z" level=info msg="StartContainer for \"a0f5c0f1a1b2436bda125cb2f70f44e735c4690618a5a0036bebbbf756ba8474\"" May 17 00:48:42.305040 systemd[1]: Started cri-containerd-a0f5c0f1a1b2436bda125cb2f70f44e735c4690618a5a0036bebbbf756ba8474.scope. May 17 00:48:42.339070 kernel: kauditd_printk_skb: 312 callbacks suppressed May 17 00:48:42.339268 kernel: audit: type=1400 audit(1747442922.333:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.339315 kernel: audit: type=1400 audit(1747442922.333:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.342480 kernel: audit: type=1400 audit(1747442922.333:929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.349626 kernel: audit: type=1400 audit(1747442922.333:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.349802 kernel: audit: type=1400 audit(1747442922.333:931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.349913 kernel: audit: type=1400 audit(1747442922.333:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.352277 kernel: audit: type=1400 audit(1747442922.333:933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.357748 kernel: audit: type=1400 audit(1747442922.333:934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.371130 kernel: audit: type=1400 audit(1747442922.333:935): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.371283 kernel: audit: type=1400 audit(1747442922.340:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.340000 audit: BPF prog-id=117 op=LOAD May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:42.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130663563306631613162323433366264613132356362326637306634 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:42.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130663563306631613162323433366264613132356362326637306634 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.343000 audit: BPF prog-id=118 op=LOAD May 17 00:48:42.343000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000215480 items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:42.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130663563306631613162323433366264613132356362326637306634 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.346000 audit: BPF prog-id=119 op=LOAD May 17 00:48:42.346000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002154c8 items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:42.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130663563306631613162323433366264613132356362326637306634 May 17 00:48:42.351000 audit: BPF prog-id=119 op=UNLOAD May 17 00:48:42.351000 audit: BPF prog-id=118 op=UNLOAD May 17 00:48:42.351000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:42.351000 audit: BPF prog-id=120 op=LOAD May 17 00:48:42.351000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002158d8 items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:42.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130663563306631613162323433366264613132356362326637306634 May 17 00:48:42.395757 env[1186]: time="2025-05-17T00:48:42.395666840Z" level=info msg="StartContainer for \"a0f5c0f1a1b2436bda125cb2f70f44e735c4690618a5a0036bebbbf756ba8474\" returns successfully" May 17 00:48:42.551143 kubelet[1950]: E0517 00:48:42.548928 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:42.551566 kubelet[1950]: E0517 00:48:42.550711 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:42.584135 kubelet[1950]: I0517 00:48:42.584056 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-8m8qr" podStartSLOduration=1.8013159760000002 podStartE2EDuration="6.584017811s" podCreationTimestamp="2025-05-17 00:48:36 +0000 UTC" firstStartedPulling="2025-05-17 00:48:37.419171939 +0000 UTC m=+5.260145214" lastFinishedPulling="2025-05-17 00:48:42.201873774 +0000 UTC m=+10.042847049" observedRunningTime="2025-05-17 00:48:42.57031678 +0000 UTC m=+10.411290067" watchObservedRunningTime="2025-05-17 00:48:42.584017811 +0000 UTC m=+10.424991096" May 17 00:48:43.221382 systemd[1]: run-containerd-runc-k8s.io-a0f5c0f1a1b2436bda125cb2f70f44e735c4690618a5a0036bebbbf756ba8474-runc.VVWajr.mount: Deactivated successfully. May 17 00:48:50.120000 audit[1338]: USER_END pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:50.121648 sudo[1338]: pam_unix(sudo:session): session closed for user root May 17 00:48:50.123162 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:48:50.123333 kernel: audit: type=1106 audit(1747442930.120:945): pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:50.120000 audit[1338]: CRED_DISP pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:50.129225 kernel: audit: type=1104 audit(1747442930.120:946): pid=1338 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:50.129957 sshd[1334]: pam_unix(sshd:session): session closed for user core May 17 00:48:50.130000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:50.135128 systemd[1]: sshd@8-24.199.117.67:22-147.75.109.163:44840.service: Deactivated successfully. May 17 00:48:50.136690 kernel: audit: type=1106 audit(1747442930.130:947): pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:50.130000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:50.136916 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:48:50.137181 systemd[1]: session-9.scope: Consumed 6.940s CPU time. May 17 00:48:50.141258 systemd-logind[1173]: Session 9 logged out. Waiting for processes to exit. May 17 00:48:50.141840 kernel: audit: type=1104 audit(1747442930.130:948): pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:50.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.199.117.67:22-147.75.109.163:44840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:50.145632 kernel: audit: type=1131 audit(1747442930.133:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.199.117.67:22-147.75.109.163:44840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:50.145835 systemd-logind[1173]: Removed session 9. May 17 00:48:51.094000 audit[2341]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.098651 kernel: audit: type=1325 audit(1747442931.094:950): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.094000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff5b8ca300 a2=0 a3=7fff5b8ca2ec items=0 ppid=2068 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:51.105637 kernel: audit: type=1300 audit(1747442931.094:950): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff5b8ca300 a2=0 a3=7fff5b8ca2ec items=0 ppid=2068 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.105874 kernel: audit: type=1327 audit(1747442931.094:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:51.107000 audit[2341]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.107000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff5b8ca300 a2=0 a3=0 items=0 ppid=2068 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.116191 kernel: audit: type=1325 audit(1747442931.107:951): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.116434 kernel: audit: type=1300 audit(1747442931.107:951): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff5b8ca300 a2=0 a3=0 items=0 ppid=2068 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:51.138000 audit[2343]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.138000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd90630a0 a2=0 a3=7ffdd906308c items=0 ppid=2068 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:51.148000 audit[2343]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:51.148000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd90630a0 a2=0 a3=0 items=0 ppid=2068 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:51.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.824000 audit[2347]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.824000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffa64c6fc0 a2=0 a3=7fffa64c6fac items=0 ppid=2068 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.832000 audit[2347]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.832000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa64c6fc0 a2=0 a3=0 items=0 ppid=2068 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.849000 audit[2349]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.849000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffc1178340 a2=0 a3=7fffc117832c items=0 ppid=2068 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.857000 audit[2349]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.857000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffc1178340 a2=0 a3=0 items=0 ppid=2068 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.954322 systemd[1]: Created slice kubepods-besteffort-pod16f97950_aebd_4b38_874e_2c5a8fda645b.slice. May 17 00:48:55.005003 kubelet[1950]: I0517 00:48:55.004874 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/16f97950-aebd-4b38-874e-2c5a8fda645b-typha-certs\") pod \"calico-typha-649b947d9f-qh7c6\" (UID: \"16f97950-aebd-4b38-874e-2c5a8fda645b\") " pod="calico-system/calico-typha-649b947d9f-qh7c6" May 17 00:48:55.005794 kubelet[1950]: I0517 00:48:55.005028 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-phnfn\" (UniqueName: \"kubernetes.io/projected/16f97950-aebd-4b38-874e-2c5a8fda645b-kube-api-access-phnfn\") pod \"calico-typha-649b947d9f-qh7c6\" (UID: \"16f97950-aebd-4b38-874e-2c5a8fda645b\") " pod="calico-system/calico-typha-649b947d9f-qh7c6" May 17 00:48:55.005794 kubelet[1950]: I0517 00:48:55.005148 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/16f97950-aebd-4b38-874e-2c5a8fda645b-tigera-ca-bundle\") pod \"calico-typha-649b947d9f-qh7c6\" (UID: \"16f97950-aebd-4b38-874e-2c5a8fda645b\") " pod="calico-system/calico-typha-649b947d9f-qh7c6" May 17 00:48:55.239281 systemd[1]: Created slice kubepods-besteffort-pod1f48eb86_8580_496d_afcc_9a1d104549e5.slice. May 17 00:48:55.259500 kubelet[1950]: E0517 00:48:55.259451 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:55.260892 env[1186]: time="2025-05-17T00:48:55.260851240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-649b947d9f-qh7c6,Uid:16f97950-aebd-4b38-874e-2c5a8fda645b,Namespace:calico-system,Attempt:0,}" May 17 00:48:55.285358 env[1186]: time="2025-05-17T00:48:55.285222488Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:55.288802 env[1186]: time="2025-05-17T00:48:55.288736102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:55.289080 env[1186]: time="2025-05-17T00:48:55.289040574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:55.289465 env[1186]: time="2025-05-17T00:48:55.289415674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a pid=2358 runtime=io.containerd.runc.v2 May 17 00:48:55.329330 systemd[1]: Started cri-containerd-4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a.scope. May 17 00:48:55.369629 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 00:48:55.369780 kernel: audit: type=1400 audit(1747442935.365:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.369870 kernel: audit: type=1400 audit(1747442935.365:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.376892 kernel: audit: type=1400 audit(1747442935.365:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.377011 kernel: audit: type=1400 audit(1747442935.365:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.377060 kernel: audit: type=1400 audit(1747442935.365:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.384344 kernel: audit: type=1400 audit(1747442935.365:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.384497 kernel: audit: type=1400 audit(1747442935.365:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.387349 kernel: audit: type=1400 audit(1747442935.365:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.390947 kernel: audit: type=1400 audit(1747442935.365:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.368000 audit: BPF prog-id=121 op=LOAD May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656635346264313039653839623531336438323430663263636132 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.397688 kernel: audit: type=1400 audit(1747442935.368:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656635346264313039653839623531336438323430663263636132 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.371000 audit: BPF prog-id=122 op=LOAD May 17 00:48:55.371000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8f20 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656635346264313039653839623531336438323430663263636132 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.373000 audit: BPF prog-id=123 op=LOAD May 17 00:48:55.373000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8f68 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656635346264313039653839623531336438323430663263636132 May 17 00:48:55.373000 audit: BPF prog-id=123 op=UNLOAD May 17 00:48:55.373000 audit: BPF prog-id=122 op=UNLOAD May 17 00:48:55.374000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit: BPF prog-id=124 op=LOAD May 17 00:48:55.374000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9378 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656635346264313039653839623531336438323430663263636132 May 17 00:48:55.408398 kubelet[1950]: I0517 00:48:55.408338 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-cni-log-dir\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408646 kubelet[1950]: I0517 00:48:55.408409 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wtds5\" (UniqueName: \"kubernetes.io/projected/1f48eb86-8580-496d-afcc-9a1d104549e5-kube-api-access-wtds5\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408646 kubelet[1950]: I0517 00:48:55.408443 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-cni-net-dir\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408646 kubelet[1950]: I0517 00:48:55.408470 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-var-run-calico\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408646 kubelet[1950]: I0517 00:48:55.408497 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f48eb86-8580-496d-afcc-9a1d104549e5-node-certs\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408646 kubelet[1950]: I0517 00:48:55.408522 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-var-lib-calico\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408827 kubelet[1950]: I0517 00:48:55.408547 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-flexvol-driver-host\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408827 kubelet[1950]: I0517 00:48:55.408569 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-lib-modules\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408827 kubelet[1950]: I0517 00:48:55.408612 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-policysync\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408827 kubelet[1950]: I0517 00:48:55.408654 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-xtables-lock\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408827 kubelet[1950]: I0517 00:48:55.408686 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f48eb86-8580-496d-afcc-9a1d104549e5-cni-bin-dir\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.408968 kubelet[1950]: I0517 00:48:55.408713 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f48eb86-8580-496d-afcc-9a1d104549e5-tigera-ca-bundle\") pod \"calico-node-vdwcw\" (UID: \"1f48eb86-8580-496d-afcc-9a1d104549e5\") " pod="calico-system/calico-node-vdwcw" May 17 00:48:55.445834 env[1186]: time="2025-05-17T00:48:55.445778362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-649b947d9f-qh7c6,Uid:16f97950-aebd-4b38-874e-2c5a8fda645b,Namespace:calico-system,Attempt:0,} returns sandbox id \"4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a\"" May 17 00:48:55.448343 kubelet[1950]: E0517 00:48:55.448284 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:55.452509 env[1186]: time="2025-05-17T00:48:55.452456258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:48:55.497608 kubelet[1950]: E0517 00:48:55.497325 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:48:55.513326 kubelet[1950]: E0517 00:48:55.513283 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.513712 kubelet[1950]: W0517 00:48:55.513677 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.513886 kubelet[1950]: E0517 00:48:55.513864 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.520241 kubelet[1950]: E0517 00:48:55.520200 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.520501 kubelet[1950]: W0517 00:48:55.520473 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.520623 kubelet[1950]: E0517 00:48:55.520603 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.535783 kubelet[1950]: E0517 00:48:55.535744 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.536053 kubelet[1950]: W0517 00:48:55.536025 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.536159 kubelet[1950]: E0517 00:48:55.536140 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.542728 env[1186]: time="2025-05-17T00:48:55.542661627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vdwcw,Uid:1f48eb86-8580-496d-afcc-9a1d104549e5,Namespace:calico-system,Attempt:0,}" May 17 00:48:55.563903 env[1186]: time="2025-05-17T00:48:55.563800820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:55.564286 env[1186]: time="2025-05-17T00:48:55.564229637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:55.564452 env[1186]: time="2025-05-17T00:48:55.564420336Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:55.564925 env[1186]: time="2025-05-17T00:48:55.564865759Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006 pid=2409 runtime=io.containerd.runc.v2 May 17 00:48:55.601211 systemd[1]: Started cri-containerd-9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006.scope. May 17 00:48:55.610652 kubelet[1950]: E0517 00:48:55.610549 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.610652 kubelet[1950]: W0517 00:48:55.610622 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.610931 kubelet[1950]: E0517 00:48:55.610671 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.610931 kubelet[1950]: I0517 00:48:55.610742 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bf62d9e0-554d-4665-aa65-a32531beade4-registration-dir\") pod \"csi-node-driver-gkf98\" (UID: \"bf62d9e0-554d-4665-aa65-a32531beade4\") " pod="calico-system/csi-node-driver-gkf98" May 17 00:48:55.611230 kubelet[1950]: E0517 00:48:55.611164 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.611230 kubelet[1950]: W0517 00:48:55.611191 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.611230 kubelet[1950]: E0517 00:48:55.611214 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.611425 kubelet[1950]: I0517 00:48:55.611247 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bf62d9e0-554d-4665-aa65-a32531beade4-varrun\") pod \"csi-node-driver-gkf98\" (UID: \"bf62d9e0-554d-4665-aa65-a32531beade4\") " pod="calico-system/csi-node-driver-gkf98" May 17 00:48:55.611646 kubelet[1950]: E0517 00:48:55.611569 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.611646 kubelet[1950]: W0517 00:48:55.611606 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.611788 kubelet[1950]: E0517 00:48:55.611670 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.611788 kubelet[1950]: I0517 00:48:55.611711 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhlpm\" (UniqueName: \"kubernetes.io/projected/bf62d9e0-554d-4665-aa65-a32531beade4-kube-api-access-vhlpm\") pod \"csi-node-driver-gkf98\" (UID: \"bf62d9e0-554d-4665-aa65-a32531beade4\") " pod="calico-system/csi-node-driver-gkf98" May 17 00:48:55.612051 kubelet[1950]: E0517 00:48:55.612027 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.612051 kubelet[1950]: W0517 00:48:55.612047 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.612180 kubelet[1950]: E0517 00:48:55.612073 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.612180 kubelet[1950]: I0517 00:48:55.612102 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bf62d9e0-554d-4665-aa65-a32531beade4-socket-dir\") pod \"csi-node-driver-gkf98\" (UID: \"bf62d9e0-554d-4665-aa65-a32531beade4\") " pod="calico-system/csi-node-driver-gkf98" May 17 00:48:55.612559 kubelet[1950]: E0517 00:48:55.612391 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.612559 kubelet[1950]: W0517 00:48:55.612409 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.612559 kubelet[1950]: E0517 00:48:55.612435 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.612559 kubelet[1950]: I0517 00:48:55.612465 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bf62d9e0-554d-4665-aa65-a32531beade4-kubelet-dir\") pod \"csi-node-driver-gkf98\" (UID: \"bf62d9e0-554d-4665-aa65-a32531beade4\") " pod="calico-system/csi-node-driver-gkf98" May 17 00:48:55.614667 kubelet[1950]: E0517 00:48:55.614376 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.614667 kubelet[1950]: W0517 00:48:55.614416 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.614667 kubelet[1950]: E0517 00:48:55.614455 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.616510 kubelet[1950]: E0517 00:48:55.616276 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.616510 kubelet[1950]: W0517 00:48:55.616306 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.616510 kubelet[1950]: E0517 00:48:55.616460 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.616971 kubelet[1950]: E0517 00:48:55.616810 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.616971 kubelet[1950]: W0517 00:48:55.616829 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.616971 kubelet[1950]: E0517 00:48:55.616883 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.617304 kubelet[1950]: E0517 00:48:55.617162 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.617304 kubelet[1950]: W0517 00:48:55.617177 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.617304 kubelet[1950]: E0517 00:48:55.617230 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.617683 kubelet[1950]: E0517 00:48:55.617475 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.617683 kubelet[1950]: W0517 00:48:55.617487 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.617789 kubelet[1950]: E0517 00:48:55.617693 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.618090 kubelet[1950]: E0517 00:48:55.617955 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.618090 kubelet[1950]: W0517 00:48:55.617974 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.618090 kubelet[1950]: E0517 00:48:55.618067 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.618430 kubelet[1950]: E0517 00:48:55.618248 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.618430 kubelet[1950]: W0517 00:48:55.618258 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.618430 kubelet[1950]: E0517 00:48:55.618269 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.618788 kubelet[1950]: E0517 00:48:55.618655 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.618788 kubelet[1950]: W0517 00:48:55.618668 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.618788 kubelet[1950]: E0517 00:48:55.618684 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.619277 kubelet[1950]: E0517 00:48:55.618976 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.619277 kubelet[1950]: W0517 00:48:55.618993 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.619277 kubelet[1950]: E0517 00:48:55.619007 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.619277 kubelet[1950]: E0517 00:48:55.619222 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.619277 kubelet[1950]: W0517 00:48:55.619231 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.619277 kubelet[1950]: E0517 00:48:55.619240 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.656000 audit: BPF prog-id=125 op=LOAD May 17 00:48:55.658000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.658000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964633762656635326562376566366130653463366230643437356333 May 17 00:48:55.658000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.658000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964633762656635326562376566366130653463366230643437356333 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.659000 audit: BPF prog-id=126 op=LOAD May 17 00:48:55.659000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c01b0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964633762656635326562376566366130653463366230643437356333 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.660000 audit: BPF prog-id=127 op=LOAD May 17 00:48:55.660000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c01f8 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964633762656635326562376566366130653463366230643437356333 May 17 00:48:55.661000 audit: BPF prog-id=127 op=UNLOAD May 17 00:48:55.661000 audit: BPF prog-id=126 op=UNLOAD May 17 00:48:55.662000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.662000 audit: BPF prog-id=128 op=LOAD May 17 00:48:55.662000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0608 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964633762656635326562376566366130653463366230643437356333 May 17 00:48:55.715328 kubelet[1950]: E0517 00:48:55.714723 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.715328 kubelet[1950]: W0517 00:48:55.714751 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.715328 kubelet[1950]: E0517 00:48:55.714779 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.715328 kubelet[1950]: E0517 00:48:55.715067 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.715328 kubelet[1950]: W0517 00:48:55.715084 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.715328 kubelet[1950]: E0517 00:48:55.715098 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715357 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716068 kubelet[1950]: W0517 00:48:55.715372 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715389 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715710 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716068 kubelet[1950]: W0517 00:48:55.715725 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715741 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715946 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716068 kubelet[1950]: W0517 00:48:55.715955 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716068 kubelet[1950]: E0517 00:48:55.715964 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716492 kubelet[1950]: E0517 00:48:55.716265 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716492 kubelet[1950]: W0517 00:48:55.716277 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716492 kubelet[1950]: E0517 00:48:55.716293 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716492 kubelet[1950]: E0517 00:48:55.716489 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716750 kubelet[1950]: W0517 00:48:55.716498 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716750 kubelet[1950]: E0517 00:48:55.716507 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.716750 kubelet[1950]: E0517 00:48:55.716677 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.716750 kubelet[1950]: W0517 00:48:55.716684 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.716750 kubelet[1950]: E0517 00:48:55.716692 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.717004 kubelet[1950]: E0517 00:48:55.716910 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.717004 kubelet[1950]: W0517 00:48:55.716929 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.717004 kubelet[1950]: E0517 00:48:55.716938 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.718801 kubelet[1950]: E0517 00:48:55.717521 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.718801 kubelet[1950]: W0517 00:48:55.717542 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.718801 kubelet[1950]: E0517 00:48:55.718469 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.719172 kubelet[1950]: E0517 00:48:55.718912 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.719172 kubelet[1950]: W0517 00:48:55.718929 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.719172 kubelet[1950]: E0517 00:48:55.719059 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.719354 kubelet[1950]: E0517 00:48:55.719242 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.719354 kubelet[1950]: W0517 00:48:55.719254 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.719459 kubelet[1950]: E0517 00:48:55.719371 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.720988 kubelet[1950]: E0517 00:48:55.720951 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.720988 kubelet[1950]: W0517 00:48:55.720977 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.721253 kubelet[1950]: E0517 00:48:55.721134 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.721344 kubelet[1950]: E0517 00:48:55.721322 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.721425 kubelet[1950]: W0517 00:48:55.721338 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.721483 kubelet[1950]: E0517 00:48:55.721442 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.721710 kubelet[1950]: E0517 00:48:55.721677 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.721710 kubelet[1950]: W0517 00:48:55.721703 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.721892 kubelet[1950]: E0517 00:48:55.721821 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.722088 kubelet[1950]: E0517 00:48:55.722068 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.722088 kubelet[1950]: W0517 00:48:55.722085 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.722224 kubelet[1950]: E0517 00:48:55.722190 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.722336 kubelet[1950]: E0517 00:48:55.722321 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.722336 kubelet[1950]: W0517 00:48:55.722331 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.722480 kubelet[1950]: E0517 00:48:55.722346 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.725035 kubelet[1950]: E0517 00:48:55.724987 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.725035 kubelet[1950]: W0517 00:48:55.725018 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.725443 kubelet[1950]: E0517 00:48:55.725285 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.725443 kubelet[1950]: W0517 00:48:55.725304 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.725443 kubelet[1950]: E0517 00:48:55.725339 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.725443 kubelet[1950]: E0517 00:48:55.725416 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.727975 kubelet[1950]: E0517 00:48:55.727919 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.727975 kubelet[1950]: W0517 00:48:55.727956 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.728293 kubelet[1950]: E0517 00:48:55.728106 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.728352 kubelet[1950]: E0517 00:48:55.728336 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.728352 kubelet[1950]: W0517 00:48:55.728345 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.728567 kubelet[1950]: E0517 00:48:55.728543 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.728895 kubelet[1950]: E0517 00:48:55.728853 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.728895 kubelet[1950]: W0517 00:48:55.728876 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.729145 kubelet[1950]: E0517 00:48:55.729081 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.729145 kubelet[1950]: E0517 00:48:55.729125 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.729145 kubelet[1950]: W0517 00:48:55.729138 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.729332 kubelet[1950]: E0517 00:48:55.729258 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.729729 kubelet[1950]: E0517 00:48:55.729458 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.729729 kubelet[1950]: W0517 00:48:55.729473 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.729729 kubelet[1950]: E0517 00:48:55.729487 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.731863 kubelet[1950]: E0517 00:48:55.731812 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.731863 kubelet[1950]: W0517 00:48:55.731845 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.731863 kubelet[1950]: E0517 00:48:55.731871 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.738198 env[1186]: time="2025-05-17T00:48:55.738140023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vdwcw,Uid:1f48eb86-8580-496d-afcc-9a1d104549e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\"" May 17 00:48:55.756231 kubelet[1950]: E0517 00:48:55.748940 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:55.756231 kubelet[1950]: W0517 00:48:55.748967 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:55.756231 kubelet[1950]: E0517 00:48:55.748994 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:55.876000 audit[2485]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:55.876000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffead286cb0 a2=0 a3=7ffead286c9c items=0 ppid=2068 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:55.883000 audit[2485]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:55.883000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffead286cb0 a2=0 a3=0 items=0 ppid=2068 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:56.126329 systemd[1]: run-containerd-runc-k8s.io-4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a-runc.om8vQm.mount: Deactivated successfully. May 17 00:48:56.816079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount274024361.mount: Deactivated successfully. May 17 00:48:57.462533 kubelet[1950]: E0517 00:48:57.462410 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:48:58.204820 env[1186]: time="2025-05-17T00:48:58.204736168Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:58.207302 env[1186]: time="2025-05-17T00:48:58.207218419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:58.209931 env[1186]: time="2025-05-17T00:48:58.209852778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:58.212431 env[1186]: time="2025-05-17T00:48:58.212352816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:58.214110 env[1186]: time="2025-05-17T00:48:58.213384146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:48:58.219169 env[1186]: time="2025-05-17T00:48:58.218970623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:48:58.258795 env[1186]: time="2025-05-17T00:48:58.258717373Z" level=info msg="CreateContainer within sandbox \"4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:48:58.288140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1270338436.mount: Deactivated successfully. May 17 00:48:58.302563 env[1186]: time="2025-05-17T00:48:58.302469988Z" level=info msg="CreateContainer within sandbox \"4def54bd109e89b513d8240f2cca230607527d3aa6869f9e6d6f79d8300df25a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"08e30c1f9ca2e255404714692cd26fe644673e929bac19d9daec2961ad646ece\"" May 17 00:48:58.304631 env[1186]: time="2025-05-17T00:48:58.303692515Z" level=info msg="StartContainer for \"08e30c1f9ca2e255404714692cd26fe644673e929bac19d9daec2961ad646ece\"" May 17 00:48:58.368018 systemd[1]: Started cri-containerd-08e30c1f9ca2e255404714692cd26fe644673e929bac19d9daec2961ad646ece.scope. May 17 00:48:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.406000 audit: BPF prog-id=129 op=LOAD May 17 00:48:58.408000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.408000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038653330633166396361326532353534303437313436393263643236 May 17 00:48:58.408000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.408000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038653330633166396361326532353534303437313436393263643236 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.409000 audit: BPF prog-id=130 op=LOAD May 17 00:48:58.409000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f7970 items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038653330633166396361326532353534303437313436393263643236 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.410000 audit: BPF prog-id=131 op=LOAD May 17 00:48:58.410000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f79b8 items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038653330633166396361326532353534303437313436393263643236 May 17 00:48:58.411000 audit: BPF prog-id=131 op=UNLOAD May 17 00:48:58.411000 audit: BPF prog-id=130 op=UNLOAD May 17 00:48:58.411000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.411000 audit: BPF prog-id=132 op=LOAD May 17 00:48:58.411000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f7dc8 items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038653330633166396361326532353534303437313436393263643236 May 17 00:48:58.493778 env[1186]: time="2025-05-17T00:48:58.493539915Z" level=info msg="StartContainer for \"08e30c1f9ca2e255404714692cd26fe644673e929bac19d9daec2961ad646ece\" returns successfully" May 17 00:48:58.599333 kubelet[1950]: E0517 00:48:58.599279 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:58.648476 kubelet[1950]: E0517 00:48:58.648412 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.648794 kubelet[1950]: W0517 00:48:58.648756 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.648940 kubelet[1950]: E0517 00:48:58.648916 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.649562 kubelet[1950]: E0517 00:48:58.649534 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.649935 kubelet[1950]: W0517 00:48:58.649880 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.650179 kubelet[1950]: E0517 00:48:58.650136 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.650823 kubelet[1950]: E0517 00:48:58.650806 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.650956 kubelet[1950]: W0517 00:48:58.650937 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.651054 kubelet[1950]: E0517 00:48:58.651040 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.651490 kubelet[1950]: E0517 00:48:58.651473 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.651689 kubelet[1950]: W0517 00:48:58.651577 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.651865 kubelet[1950]: E0517 00:48:58.651845 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.654247 kubelet[1950]: E0517 00:48:58.654209 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.654568 kubelet[1950]: W0517 00:48:58.654538 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.654763 kubelet[1950]: E0517 00:48:58.654733 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.655322 kubelet[1950]: E0517 00:48:58.655289 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.655494 kubelet[1950]: W0517 00:48:58.655471 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.655808 kubelet[1950]: E0517 00:48:58.655784 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.658408 kubelet[1950]: E0517 00:48:58.658341 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.658714 kubelet[1950]: W0517 00:48:58.658681 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.658908 kubelet[1950]: E0517 00:48:58.658872 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.659465 kubelet[1950]: E0517 00:48:58.659440 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.659677 kubelet[1950]: W0517 00:48:58.659649 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.659827 kubelet[1950]: E0517 00:48:58.659807 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.660318 kubelet[1950]: E0517 00:48:58.660295 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.660455 kubelet[1950]: W0517 00:48:58.660438 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.660556 kubelet[1950]: E0517 00:48:58.660537 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.661236 kubelet[1950]: E0517 00:48:58.661212 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.661388 kubelet[1950]: W0517 00:48:58.661364 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.661521 kubelet[1950]: E0517 00:48:58.661502 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.662360 kubelet[1950]: E0517 00:48:58.662329 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.662503 kubelet[1950]: W0517 00:48:58.662480 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.662635 kubelet[1950]: E0517 00:48:58.662615 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.663076 kubelet[1950]: E0517 00:48:58.663055 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.663208 kubelet[1950]: W0517 00:48:58.663189 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.663328 kubelet[1950]: E0517 00:48:58.663309 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.663825 kubelet[1950]: E0517 00:48:58.663806 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.663949 kubelet[1950]: W0517 00:48:58.663930 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.664047 kubelet[1950]: E0517 00:48:58.664029 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.664441 kubelet[1950]: E0517 00:48:58.664422 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.664568 kubelet[1950]: W0517 00:48:58.664549 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.664717 kubelet[1950]: E0517 00:48:58.664698 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.665070 kubelet[1950]: E0517 00:48:58.665053 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.665190 kubelet[1950]: W0517 00:48:58.665170 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.665869 kubelet[1950]: E0517 00:48:58.665841 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.748701 kubelet[1950]: E0517 00:48:58.748539 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.748944 kubelet[1950]: W0517 00:48:58.748919 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.749076 kubelet[1950]: E0517 00:48:58.749059 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.749573 kubelet[1950]: E0517 00:48:58.749555 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.749858 kubelet[1950]: W0517 00:48:58.749839 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.749978 kubelet[1950]: E0517 00:48:58.749963 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.750385 kubelet[1950]: E0517 00:48:58.750370 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.750496 kubelet[1950]: W0517 00:48:58.750481 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.750619 kubelet[1950]: E0517 00:48:58.750603 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.751009 kubelet[1950]: E0517 00:48:58.750987 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.751123 kubelet[1950]: W0517 00:48:58.751107 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.751218 kubelet[1950]: E0517 00:48:58.751204 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.751535 kubelet[1950]: E0517 00:48:58.751522 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.751678 kubelet[1950]: W0517 00:48:58.751663 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.751795 kubelet[1950]: E0517 00:48:58.751778 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.752102 kubelet[1950]: E0517 00:48:58.752082 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.752212 kubelet[1950]: W0517 00:48:58.752198 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.752312 kubelet[1950]: E0517 00:48:58.752298 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.752623 kubelet[1950]: E0517 00:48:58.752609 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.752740 kubelet[1950]: W0517 00:48:58.752727 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.752853 kubelet[1950]: E0517 00:48:58.752839 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.753148 kubelet[1950]: E0517 00:48:58.753128 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.753245 kubelet[1950]: W0517 00:48:58.753232 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.753349 kubelet[1950]: E0517 00:48:58.753335 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.753701 kubelet[1950]: E0517 00:48:58.753686 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.753816 kubelet[1950]: W0517 00:48:58.753801 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.753912 kubelet[1950]: E0517 00:48:58.753899 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.754207 kubelet[1950]: E0517 00:48:58.754193 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.754333 kubelet[1950]: W0517 00:48:58.754318 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.754421 kubelet[1950]: E0517 00:48:58.754407 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.754797 kubelet[1950]: E0517 00:48:58.754783 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.754900 kubelet[1950]: W0517 00:48:58.754885 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.754989 kubelet[1950]: E0517 00:48:58.754975 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.755250 kubelet[1950]: E0517 00:48:58.755238 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.755345 kubelet[1950]: W0517 00:48:58.755328 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.755435 kubelet[1950]: E0517 00:48:58.755423 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.755750 kubelet[1950]: E0517 00:48:58.755737 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.755860 kubelet[1950]: W0517 00:48:58.755845 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.755949 kubelet[1950]: E0517 00:48:58.755935 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.756317 kubelet[1950]: E0517 00:48:58.756290 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.756317 kubelet[1950]: W0517 00:48:58.756311 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.756427 kubelet[1950]: E0517 00:48:58.756328 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.758701 kubelet[1950]: E0517 00:48:58.756803 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.758701 kubelet[1950]: W0517 00:48:58.756819 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.758701 kubelet[1950]: E0517 00:48:58.756832 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.759822 kubelet[1950]: E0517 00:48:58.759792 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.760020 kubelet[1950]: W0517 00:48:58.759993 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.760149 kubelet[1950]: E0517 00:48:58.760130 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.760640 kubelet[1950]: E0517 00:48:58.760620 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.760788 kubelet[1950]: W0517 00:48:58.760767 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.760883 kubelet[1950]: E0517 00:48:58.760867 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:58.762959 kubelet[1950]: E0517 00:48:58.762930 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:58.763107 kubelet[1950]: W0517 00:48:58.763089 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:58.763205 kubelet[1950]: E0517 00:48:58.763190 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.459943 kubelet[1950]: E0517 00:48:59.459861 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:48:59.573526 env[1186]: time="2025-05-17T00:48:59.573464603Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:59.576415 env[1186]: time="2025-05-17T00:48:59.576317802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:59.579374 env[1186]: time="2025-05-17T00:48:59.579321932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:59.581630 env[1186]: time="2025-05-17T00:48:59.581554264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:59.582943 env[1186]: time="2025-05-17T00:48:59.582888376Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:48:59.588440 env[1186]: time="2025-05-17T00:48:59.588377438Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:48:59.610907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1737036775.mount: Deactivated successfully. May 17 00:48:59.616817 kubelet[1950]: I0517 00:48:59.616761 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:59.618016 kubelet[1950]: E0517 00:48:59.617738 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:48:59.618414 env[1186]: time="2025-05-17T00:48:59.618353530Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889\"" May 17 00:48:59.620900 env[1186]: time="2025-05-17T00:48:59.620843865Z" level=info msg="StartContainer for \"454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889\"" May 17 00:48:59.665255 systemd[1]: Started cri-containerd-454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889.scope. May 17 00:48:59.683818 kubelet[1950]: E0517 00:48:59.683725 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.683818 kubelet[1950]: W0517 00:48:59.683777 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.683818 kubelet[1950]: E0517 00:48:59.683814 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.686001 kubelet[1950]: E0517 00:48:59.685946 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.686001 kubelet[1950]: W0517 00:48:59.686002 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.686305 kubelet[1950]: E0517 00:48:59.686037 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.686774 kubelet[1950]: E0517 00:48:59.686738 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.686903 kubelet[1950]: W0517 00:48:59.686768 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.686903 kubelet[1950]: E0517 00:48:59.686816 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.687233 kubelet[1950]: E0517 00:48:59.687203 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.687324 kubelet[1950]: W0517 00:48:59.687228 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.687324 kubelet[1950]: E0517 00:48:59.687260 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.687733 kubelet[1950]: E0517 00:48:59.687700 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.687733 kubelet[1950]: W0517 00:48:59.687725 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.687884 kubelet[1950]: E0517 00:48:59.687746 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.688126 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.692635 kubelet[1950]: W0517 00:48:59.688214 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.688237 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.688678 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.692635 kubelet[1950]: W0517 00:48:59.688695 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.688713 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.688986 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.692635 kubelet[1950]: W0517 00:48:59.689002 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.689020 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.692635 kubelet[1950]: E0517 00:48:59.689293 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.693295 kubelet[1950]: W0517 00:48:59.689309 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.689325 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.689573 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.693295 kubelet[1950]: W0517 00:48:59.689629 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.689772 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.690076 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.693295 kubelet[1950]: W0517 00:48:59.690092 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.690110 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.693295 kubelet[1950]: E0517 00:48:59.690360 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.693295 kubelet[1950]: W0517 00:48:59.690374 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.694020 kubelet[1950]: E0517 00:48:59.690391 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.694020 kubelet[1950]: E0517 00:48:59.690682 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.694020 kubelet[1950]: W0517 00:48:59.690696 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.694020 kubelet[1950]: E0517 00:48:59.690712 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.697630 kubelet[1950]: E0517 00:48:59.695425 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.697630 kubelet[1950]: W0517 00:48:59.695505 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.697630 kubelet[1950]: E0517 00:48:59.695546 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.697630 kubelet[1950]: E0517 00:48:59.696074 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.697630 kubelet[1950]: W0517 00:48:59.696100 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.697630 kubelet[1950]: E0517 00:48:59.696128 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.723000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.723000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f94184ebba8 items=0 ppid=2409 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346561613733656266623136393165353062376562623164663665 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.724000 audit: BPF prog-id=133 op=LOAD May 17 00:48:59.724000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003093f8 items=0 ppid=2409 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346561613733656266623136393165353062376562623164663665 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.726000 audit: BPF prog-id=134 op=LOAD May 17 00:48:59.726000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000309448 items=0 ppid=2409 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346561613733656266623136393165353062376562623164663665 May 17 00:48:59.728000 audit: BPF prog-id=134 op=UNLOAD May 17 00:48:59.728000 audit: BPF prog-id=133 op=UNLOAD May 17 00:48:59.728000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.728000 audit: BPF prog-id=135 op=LOAD May 17 00:48:59.728000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003094d8 items=0 ppid=2409 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346561613733656266623136393165353062376562623164663665 May 17 00:48:59.755326 env[1186]: time="2025-05-17T00:48:59.755265958Z" level=info msg="StartContainer for \"454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889\" returns successfully" May 17 00:48:59.761658 kubelet[1950]: E0517 00:48:59.760414 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.761658 kubelet[1950]: W0517 00:48:59.760448 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.761658 kubelet[1950]: E0517 00:48:59.760479 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.761658 kubelet[1950]: E0517 00:48:59.760893 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.761658 kubelet[1950]: W0517 00:48:59.760909 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.761658 kubelet[1950]: E0517 00:48:59.760936 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.763782 kubelet[1950]: E0517 00:48:59.762998 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.763782 kubelet[1950]: W0517 00:48:59.763030 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.763782 kubelet[1950]: E0517 00:48:59.763066 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.764101 kubelet[1950]: E0517 00:48:59.763834 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.764101 kubelet[1950]: W0517 00:48:59.763856 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.764101 kubelet[1950]: E0517 00:48:59.763992 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.764258 kubelet[1950]: E0517 00:48:59.764225 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.764258 kubelet[1950]: W0517 00:48:59.764243 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.764638 kubelet[1950]: E0517 00:48:59.764354 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.764752 kubelet[1950]: E0517 00:48:59.764652 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.764752 kubelet[1950]: W0517 00:48:59.764666 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.764847 kubelet[1950]: E0517 00:48:59.764778 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.765152 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.769919 kubelet[1950]: W0517 00:48:59.765178 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.765198 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.765531 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.769919 kubelet[1950]: W0517 00:48:59.765553 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.765574 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.766127 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.769919 kubelet[1950]: W0517 00:48:59.766144 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.766257 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.769919 kubelet[1950]: E0517 00:48:59.766798 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771182 kubelet[1950]: W0517 00:48:59.766812 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.766920 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.767067 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771182 kubelet[1950]: W0517 00:48:59.767079 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.767179 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.767320 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771182 kubelet[1950]: W0517 00:48:59.767330 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.767346 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771182 kubelet[1950]: E0517 00:48:59.767612 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771182 kubelet[1950]: W0517 00:48:59.767624 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.767640 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.767935 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771749 kubelet[1950]: W0517 00:48:59.767947 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.767964 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.768749 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771749 kubelet[1950]: W0517 00:48:59.768765 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.768869 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.769036 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.771749 kubelet[1950]: W0517 00:48:59.769046 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.771749 kubelet[1950]: E0517 00:48:59.769059 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.772194 kubelet[1950]: E0517 00:48:59.769307 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.772194 kubelet[1950]: W0517 00:48:59.769318 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.772194 kubelet[1950]: E0517 00:48:59.769332 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.772194 kubelet[1950]: E0517 00:48:59.769797 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:59.772194 kubelet[1950]: W0517 00:48:59.769812 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:59.772194 kubelet[1950]: E0517 00:48:59.769827 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:59.785143 systemd[1]: cri-containerd-454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889.scope: Deactivated successfully. May 17 00:48:59.789000 audit: BPF prog-id=135 op=UNLOAD May 17 00:48:59.865498 env[1186]: time="2025-05-17T00:48:59.865406912Z" level=info msg="shim disconnected" id=454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889 May 17 00:48:59.865881 env[1186]: time="2025-05-17T00:48:59.865505575Z" level=warning msg="cleaning up after shim disconnected" id=454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889 namespace=k8s.io May 17 00:48:59.865881 env[1186]: time="2025-05-17T00:48:59.865524416Z" level=info msg="cleaning up dead shim" May 17 00:48:59.889336 env[1186]: time="2025-05-17T00:48:59.889253025Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:48:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2638 runtime=io.containerd.runc.v2\n" May 17 00:49:00.230310 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-454eaa73ebfb1691e50b7ebb1df6e409c2422118bae415c48744d14c90ab7889-rootfs.mount: Deactivated successfully. May 17 00:49:00.632270 env[1186]: time="2025-05-17T00:49:00.631730639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:49:00.676139 kubelet[1950]: I0517 00:49:00.676042 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-649b947d9f-qh7c6" podStartSLOduration=3.909869386 podStartE2EDuration="6.676015308s" podCreationTimestamp="2025-05-17 00:48:54 +0000 UTC" firstStartedPulling="2025-05-17 00:48:55.449562218 +0000 UTC m=+23.290535480" lastFinishedPulling="2025-05-17 00:48:58.215708124 +0000 UTC m=+26.056681402" observedRunningTime="2025-05-17 00:48:58.631351815 +0000 UTC m=+26.472325096" watchObservedRunningTime="2025-05-17 00:49:00.676015308 +0000 UTC m=+28.516988612" May 17 00:49:01.460077 kubelet[1950]: E0517 00:49:01.459961 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:49:03.459681 kubelet[1950]: E0517 00:49:03.459414 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:49:05.234783 env[1186]: time="2025-05-17T00:49:05.234711090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:05.236533 env[1186]: time="2025-05-17T00:49:05.236475952Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:05.238659 env[1186]: time="2025-05-17T00:49:05.238565634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:05.241079 env[1186]: time="2025-05-17T00:49:05.241015117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:05.242048 env[1186]: time="2025-05-17T00:49:05.241984020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:49:05.246574 env[1186]: time="2025-05-17T00:49:05.246471750Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:49:05.267409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2227343756.mount: Deactivated successfully. May 17 00:49:05.282961 env[1186]: time="2025-05-17T00:49:05.282848900Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4\"" May 17 00:49:05.286803 env[1186]: time="2025-05-17T00:49:05.286720975Z" level=info msg="StartContainer for \"2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4\"" May 17 00:49:05.345328 systemd[1]: Started cri-containerd-2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4.scope. May 17 00:49:05.395000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.396720 kernel: kauditd_printk_skb: 211 callbacks suppressed May 17 00:49:05.396889 kernel: audit: type=1400 audit(1747442945.395:1021): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.395000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efcd27aad58 items=0 ppid=2409 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.404635 kernel: audit: type=1300 audit(1747442945.395:1021): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efcd27aad58 items=0 ppid=2409 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.404864 kernel: audit: type=1327 audit(1747442945.395:1021): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313334323130396630643163303838653830663938643335323864 May 17 00:49:05.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313334323130396630643163303838653830663938643335323864 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411917 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.412161 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.418287 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.418523 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.425233 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.425444 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.432415 kernel: audit: type=1400 audit(1747442945.399:1022): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.399000 audit: BPF prog-id=136 op=LOAD May 17 00:49:05.399000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00027c898 items=0 ppid=2409 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313334323130396630643163303838653830663938643335323864 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.411000 audit: BPF prog-id=137 op=LOAD May 17 00:49:05.411000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00027c8e8 items=0 ppid=2409 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313334323130396630643163303838653830663938643335323864 May 17 00:49:05.421000 audit: BPF prog-id=137 op=UNLOAD May 17 00:49:05.421000 audit: BPF prog-id=136 op=UNLOAD May 17 00:49:05.421000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:05.421000 audit: BPF prog-id=138 op=LOAD May 17 00:49:05.421000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00027c978 items=0 ppid=2409 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313334323130396630643163303838653830663938643335323864 May 17 00:49:05.461793 kubelet[1950]: E0517 00:49:05.460097 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:49:05.480366 env[1186]: time="2025-05-17T00:49:05.480284067Z" level=info msg="StartContainer for \"2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4\" returns successfully" May 17 00:49:06.458938 env[1186]: time="2025-05-17T00:49:06.458867239Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:49:06.465243 systemd[1]: cri-containerd-2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4.scope: Deactivated successfully. May 17 00:49:06.469000 audit: BPF prog-id=138 op=UNLOAD May 17 00:49:06.505043 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4-rootfs.mount: Deactivated successfully. May 17 00:49:06.512117 env[1186]: time="2025-05-17T00:49:06.512017514Z" level=info msg="shim disconnected" id=2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4 May 17 00:49:06.512516 env[1186]: time="2025-05-17T00:49:06.512480203Z" level=warning msg="cleaning up after shim disconnected" id=2a1342109f0d1c088e80f98d3528df48129643a12924ce5f6f7578e885ae61f4 namespace=k8s.io May 17 00:49:06.512631 env[1186]: time="2025-05-17T00:49:06.512612056Z" level=info msg="cleaning up dead shim" May 17 00:49:06.529271 kubelet[1950]: I0517 00:49:06.529217 1950 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:49:06.546440 env[1186]: time="2025-05-17T00:49:06.546207947Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:49:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2705 runtime=io.containerd.runc.v2\n" May 17 00:49:06.625478 systemd[1]: Created slice kubepods-burstable-pod58e0b9ad_f250_4b99_a906_e77515643e8e.slice. May 17 00:49:06.643199 systemd[1]: Created slice kubepods-besteffort-podbca9900e_9230_46ca_a87f_24baf2ab2a74.slice. May 17 00:49:06.653092 kubelet[1950]: W0517 00:49:06.653015 1950 reflector.go:561] object-"calico-system"/"whisker-ca-bundle": failed to list *v1.ConfigMap: configmaps "whisker-ca-bundle" is forbidden: User "system:node:ci-3510.3.7-n-f656071047" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-f656071047' and this object May 17 00:49:06.653420 kubelet[1950]: W0517 00:49:06.653389 1950 reflector.go:561] object-"calico-system"/"whisker-backend-key-pair": failed to list *v1.Secret: secrets "whisker-backend-key-pair" is forbidden: User "system:node:ci-3510.3.7-n-f656071047" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-f656071047' and this object May 17 00:49:06.656317 kubelet[1950]: E0517 00:49:06.656239 1950 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"whisker-backend-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"whisker-backend-key-pair\" is forbidden: User \"system:node:ci-3510.3.7-n-f656071047\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-f656071047' and this object" logger="UnhandledError" May 17 00:49:06.657333 kubelet[1950]: E0517 00:49:06.657273 1950 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"whisker-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"whisker-ca-bundle\" is forbidden: User \"system:node:ci-3510.3.7-n-f656071047\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-f656071047' and this object" logger="UnhandledError" May 17 00:49:06.661421 systemd[1]: Created slice kubepods-besteffort-pode695e6ca_70af_4c0a_aa8b_bbd459269076.slice. May 17 00:49:06.675544 systemd[1]: Created slice kubepods-besteffort-pod996c6d29_266c_48b3_a5d3_e06154625b48.slice. May 17 00:49:06.678657 env[1186]: time="2025-05-17T00:49:06.678253892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:49:06.693581 systemd[1]: Created slice kubepods-besteffort-podb40980c3_26b1_4e2f_b65e_d6ba9d50877d.slice. May 17 00:49:06.709647 systemd[1]: Created slice kubepods-burstable-pod3461bd46_ccb4_49ae_adb8_d3251ec9543b.slice. May 17 00:49:06.719629 systemd[1]: Created slice kubepods-besteffort-pod27c3d624_d977_468e_a5a3_c72cbb3b2e4d.slice. May 17 00:49:06.757937 kubelet[1950]: I0517 00:49:06.757862 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair\") pod \"whisker-b97559666-s7gpw\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " pod="calico-system/whisker-b97559666-s7gpw" May 17 00:49:06.758291 kubelet[1950]: I0517 00:49:06.758256 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/58e0b9ad-f250-4b99-a906-e77515643e8e-config-volume\") pod \"coredns-7c65d6cfc9-797cd\" (UID: \"58e0b9ad-f250-4b99-a906-e77515643e8e\") " pod="kube-system/coredns-7c65d6cfc9-797cd" May 17 00:49:06.758539 kubelet[1950]: I0517 00:49:06.758482 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bca9900e-9230-46ca-a87f-24baf2ab2a74-tigera-ca-bundle\") pod \"calico-kube-controllers-86d6858c89-btznn\" (UID: \"bca9900e-9230-46ca-a87f-24baf2ab2a74\") " pod="calico-system/calico-kube-controllers-86d6858c89-btznn" May 17 00:49:06.758776 kubelet[1950]: I0517 00:49:06.758746 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/996c6d29-266c-48b3-a5d3-e06154625b48-calico-apiserver-certs\") pod \"calico-apiserver-6d846f879f-7ch5r\" (UID: \"996c6d29-266c-48b3-a5d3-e06154625b48\") " pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" May 17 00:49:06.758912 kubelet[1950]: I0517 00:49:06.758894 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/e695e6ca-70af-4c0a-aa8b-bbd459269076-config\") pod \"goldmane-8f77d7b6c-qvcxd\" (UID: \"e695e6ca-70af-4c0a-aa8b-bbd459269076\") " pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:06.759011 kubelet[1950]: I0517 00:49:06.758996 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgx8q\" (UniqueName: \"kubernetes.io/projected/58e0b9ad-f250-4b99-a906-e77515643e8e-kube-api-access-rgx8q\") pod \"coredns-7c65d6cfc9-797cd\" (UID: \"58e0b9ad-f250-4b99-a906-e77515643e8e\") " pod="kube-system/coredns-7c65d6cfc9-797cd" May 17 00:49:06.759106 kubelet[1950]: I0517 00:49:06.759087 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gr4kl\" (UniqueName: \"kubernetes.io/projected/bca9900e-9230-46ca-a87f-24baf2ab2a74-kube-api-access-gr4kl\") pod \"calico-kube-controllers-86d6858c89-btznn\" (UID: \"bca9900e-9230-46ca-a87f-24baf2ab2a74\") " pod="calico-system/calico-kube-controllers-86d6858c89-btznn" May 17 00:49:06.759235 kubelet[1950]: I0517 00:49:06.759214 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3461bd46-ccb4-49ae-adb8-d3251ec9543b-config-volume\") pod \"coredns-7c65d6cfc9-ddxgk\" (UID: \"3461bd46-ccb4-49ae-adb8-d3251ec9543b\") " pod="kube-system/coredns-7c65d6cfc9-ddxgk" May 17 00:49:06.759329 kubelet[1950]: I0517 00:49:06.759315 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5llfj\" (UniqueName: \"kubernetes.io/projected/3461bd46-ccb4-49ae-adb8-d3251ec9543b-kube-api-access-5llfj\") pod \"coredns-7c65d6cfc9-ddxgk\" (UID: \"3461bd46-ccb4-49ae-adb8-d3251ec9543b\") " pod="kube-system/coredns-7c65d6cfc9-ddxgk" May 17 00:49:06.759439 kubelet[1950]: I0517 00:49:06.759412 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle\") pod \"whisker-b97559666-s7gpw\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " pod="calico-system/whisker-b97559666-s7gpw" May 17 00:49:06.759552 kubelet[1950]: I0517 00:49:06.759536 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e695e6ca-70af-4c0a-aa8b-bbd459269076-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-qvcxd\" (UID: \"e695e6ca-70af-4c0a-aa8b-bbd459269076\") " pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:06.759671 kubelet[1950]: I0517 00:49:06.759649 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cz4l\" (UniqueName: \"kubernetes.io/projected/e695e6ca-70af-4c0a-aa8b-bbd459269076-kube-api-access-5cz4l\") pod \"goldmane-8f77d7b6c-qvcxd\" (UID: \"e695e6ca-70af-4c0a-aa8b-bbd459269076\") " pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:06.759811 kubelet[1950]: I0517 00:49:06.759782 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jc8kr\" (UniqueName: \"kubernetes.io/projected/996c6d29-266c-48b3-a5d3-e06154625b48-kube-api-access-jc8kr\") pod \"calico-apiserver-6d846f879f-7ch5r\" (UID: \"996c6d29-266c-48b3-a5d3-e06154625b48\") " pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" May 17 00:49:06.759938 kubelet[1950]: I0517 00:49:06.759917 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tk79d\" (UniqueName: \"kubernetes.io/projected/27c3d624-d977-468e-a5a3-c72cbb3b2e4d-kube-api-access-tk79d\") pod \"calico-apiserver-6d846f879f-xdqfj\" (UID: \"27c3d624-d977-468e-a5a3-c72cbb3b2e4d\") " pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" May 17 00:49:06.760070 kubelet[1950]: I0517 00:49:06.760048 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/e695e6ca-70af-4c0a-aa8b-bbd459269076-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-qvcxd\" (UID: \"e695e6ca-70af-4c0a-aa8b-bbd459269076\") " pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:06.760213 kubelet[1950]: I0517 00:49:06.760189 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/27c3d624-d977-468e-a5a3-c72cbb3b2e4d-calico-apiserver-certs\") pod \"calico-apiserver-6d846f879f-xdqfj\" (UID: \"27c3d624-d977-468e-a5a3-c72cbb3b2e4d\") " pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" May 17 00:49:06.760502 kubelet[1950]: I0517 00:49:06.760475 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktxtv\" (UniqueName: \"kubernetes.io/projected/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-kube-api-access-ktxtv\") pod \"whisker-b97559666-s7gpw\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " pod="calico-system/whisker-b97559666-s7gpw" May 17 00:49:06.990443 env[1186]: time="2025-05-17T00:49:06.988275226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-7ch5r,Uid:996c6d29-266c-48b3-a5d3-e06154625b48,Namespace:calico-apiserver,Attempt:0,}" May 17 00:49:07.017578 kubelet[1950]: E0517 00:49:07.017515 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:07.022455 env[1186]: time="2025-05-17T00:49:07.022385556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ddxgk,Uid:3461bd46-ccb4-49ae-adb8-d3251ec9543b,Namespace:kube-system,Attempt:0,}" May 17 00:49:07.026049 env[1186]: time="2025-05-17T00:49:07.025970609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-xdqfj,Uid:27c3d624-d977-468e-a5a3-c72cbb3b2e4d,Namespace:calico-apiserver,Attempt:0,}" May 17 00:49:07.244404 kubelet[1950]: E0517 00:49:07.241085 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:07.244882 env[1186]: time="2025-05-17T00:49:07.242519367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-797cd,Uid:58e0b9ad-f250-4b99-a906-e77515643e8e,Namespace:kube-system,Attempt:0,}" May 17 00:49:07.254583 env[1186]: time="2025-05-17T00:49:07.253581671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86d6858c89-btznn,Uid:bca9900e-9230-46ca-a87f-24baf2ab2a74,Namespace:calico-system,Attempt:0,}" May 17 00:49:07.270452 env[1186]: time="2025-05-17T00:49:07.270400333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-qvcxd,Uid:e695e6ca-70af-4c0a-aa8b-bbd459269076,Namespace:calico-system,Attempt:0,}" May 17 00:49:07.394140 env[1186]: time="2025-05-17T00:49:07.394024476Z" level=error msg="Failed to destroy network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.395173 env[1186]: time="2025-05-17T00:49:07.395084808Z" level=error msg="encountered an error cleaning up failed sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.395476 env[1186]: time="2025-05-17T00:49:07.395420601Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ddxgk,Uid:3461bd46-ccb4-49ae-adb8-d3251ec9543b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.397449 kubelet[1950]: E0517 00:49:07.395905 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.397449 kubelet[1950]: E0517 00:49:07.396028 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ddxgk" May 17 00:49:07.397449 kubelet[1950]: E0517 00:49:07.396071 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ddxgk" May 17 00:49:07.397906 kubelet[1950]: E0517 00:49:07.396145 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-ddxgk_kube-system(3461bd46-ccb4-49ae-adb8-d3251ec9543b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-ddxgk_kube-system(3461bd46-ccb4-49ae-adb8-d3251ec9543b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ddxgk" podUID="3461bd46-ccb4-49ae-adb8-d3251ec9543b" May 17 00:49:07.468220 systemd[1]: Created slice kubepods-besteffort-podbf62d9e0_554d_4665_aa65_a32531beade4.slice. May 17 00:49:07.472907 env[1186]: time="2025-05-17T00:49:07.472841809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gkf98,Uid:bf62d9e0-554d-4665-aa65-a32531beade4,Namespace:calico-system,Attempt:0,}" May 17 00:49:07.514831 env[1186]: time="2025-05-17T00:49:07.511031630Z" level=error msg="Failed to destroy network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.517157 env[1186]: time="2025-05-17T00:49:07.517068107Z" level=error msg="encountered an error cleaning up failed sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.519124 env[1186]: time="2025-05-17T00:49:07.519032441Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-xdqfj,Uid:27c3d624-d977-468e-a5a3-c72cbb3b2e4d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.523667 kubelet[1950]: E0517 00:49:07.523193 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.523667 kubelet[1950]: E0517 00:49:07.523290 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" May 17 00:49:07.523667 kubelet[1950]: E0517 00:49:07.523325 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" May 17 00:49:07.524015 kubelet[1950]: E0517 00:49:07.523424 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d846f879f-xdqfj_calico-apiserver(27c3d624-d977-468e-a5a3-c72cbb3b2e4d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d846f879f-xdqfj_calico-apiserver(27c3d624-d977-468e-a5a3-c72cbb3b2e4d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" podUID="27c3d624-d977-468e-a5a3-c72cbb3b2e4d" May 17 00:49:07.536137 env[1186]: time="2025-05-17T00:49:07.536042351Z" level=error msg="Failed to destroy network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.538032 env[1186]: time="2025-05-17T00:49:07.537934790Z" level=error msg="encountered an error cleaning up failed sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.539094 env[1186]: time="2025-05-17T00:49:07.538990755Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-7ch5r,Uid:996c6d29-266c-48b3-a5d3-e06154625b48,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.542654 kubelet[1950]: E0517 00:49:07.539737 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.542654 kubelet[1950]: E0517 00:49:07.539837 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" May 17 00:49:07.542654 kubelet[1950]: E0517 00:49:07.539872 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" May 17 00:49:07.543266 kubelet[1950]: E0517 00:49:07.539945 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d846f879f-7ch5r_calico-apiserver(996c6d29-266c-48b3-a5d3-e06154625b48)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d846f879f-7ch5r_calico-apiserver(996c6d29-266c-48b3-a5d3-e06154625b48)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" podUID="996c6d29-266c-48b3-a5d3-e06154625b48" May 17 00:49:07.566407 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d-shm.mount: Deactivated successfully. May 17 00:49:07.566559 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e-shm.mount: Deactivated successfully. May 17 00:49:07.642083 env[1186]: time="2025-05-17T00:49:07.641973837Z" level=error msg="Failed to destroy network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.649939 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8-shm.mount: Deactivated successfully. May 17 00:49:07.654041 env[1186]: time="2025-05-17T00:49:07.653933361Z" level=error msg="encountered an error cleaning up failed sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.654744 env[1186]: time="2025-05-17T00:49:07.654068414Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-qvcxd,Uid:e695e6ca-70af-4c0a-aa8b-bbd459269076,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.654893 kubelet[1950]: E0517 00:49:07.654437 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.654893 kubelet[1950]: E0517 00:49:07.654559 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:07.654893 kubelet[1950]: E0517 00:49:07.654583 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-qvcxd" May 17 00:49:07.656831 kubelet[1950]: E0517 00:49:07.654661 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:07.676801 kubelet[1950]: I0517 00:49:07.676742 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:07.687512 env[1186]: time="2025-05-17T00:49:07.687458071Z" level=info msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" May 17 00:49:07.691631 kubelet[1950]: I0517 00:49:07.691369 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:07.695378 env[1186]: time="2025-05-17T00:49:07.695309821Z" level=info msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" May 17 00:49:07.705654 kubelet[1950]: I0517 00:49:07.705548 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:07.709359 env[1186]: time="2025-05-17T00:49:07.708982667Z" level=info msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" May 17 00:49:07.710657 kubelet[1950]: I0517 00:49:07.710582 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:07.711491 env[1186]: time="2025-05-17T00:49:07.711430521Z" level=info msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" May 17 00:49:07.806099 env[1186]: time="2025-05-17T00:49:07.803844506Z" level=error msg="Failed to destroy network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.807195 env[1186]: time="2025-05-17T00:49:07.806997957Z" level=error msg="encountered an error cleaning up failed sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.807424 env[1186]: time="2025-05-17T00:49:07.807383952Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-797cd,Uid:58e0b9ad-f250-4b99-a906-e77515643e8e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.810529 kubelet[1950]: E0517 00:49:07.807779 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.810529 kubelet[1950]: E0517 00:49:07.807870 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-797cd" May 17 00:49:07.810529 kubelet[1950]: E0517 00:49:07.807893 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-797cd" May 17 00:49:07.809518 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1-shm.mount: Deactivated successfully. May 17 00:49:07.811027 kubelet[1950]: E0517 00:49:07.807956 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-797cd_kube-system(58e0b9ad-f250-4b99-a906-e77515643e8e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-797cd_kube-system(58e0b9ad-f250-4b99-a906-e77515643e8e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-797cd" podUID="58e0b9ad-f250-4b99-a906-e77515643e8e" May 17 00:49:07.833694 env[1186]: time="2025-05-17T00:49:07.833609513Z" level=error msg="Failed to destroy network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.841089 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2-shm.mount: Deactivated successfully. May 17 00:49:07.843870 env[1186]: time="2025-05-17T00:49:07.843775995Z" level=error msg="encountered an error cleaning up failed sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.844034 env[1186]: time="2025-05-17T00:49:07.843887024Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86d6858c89-btznn,Uid:bca9900e-9230-46ca-a87f-24baf2ab2a74,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.844638 kubelet[1950]: E0517 00:49:07.844273 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.844638 kubelet[1950]: E0517 00:49:07.844344 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86d6858c89-btznn" May 17 00:49:07.844638 kubelet[1950]: E0517 00:49:07.844372 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86d6858c89-btznn" May 17 00:49:07.844878 kubelet[1950]: E0517 00:49:07.844422 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-86d6858c89-btznn_calico-system(bca9900e-9230-46ca-a87f-24baf2ab2a74)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-86d6858c89-btznn_calico-system(bca9900e-9230-46ca-a87f-24baf2ab2a74)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86d6858c89-btznn" podUID="bca9900e-9230-46ca-a87f-24baf2ab2a74" May 17 00:49:07.856740 env[1186]: time="2025-05-17T00:49:07.856648266Z" level=error msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" failed" error="failed to destroy network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.857479 kubelet[1950]: E0517 00:49:07.857257 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:07.857479 kubelet[1950]: E0517 00:49:07.857329 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8"} May 17 00:49:07.857479 kubelet[1950]: E0517 00:49:07.857395 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e695e6ca-70af-4c0a-aa8b-bbd459269076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:07.857479 kubelet[1950]: E0517 00:49:07.857426 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e695e6ca-70af-4c0a-aa8b-bbd459269076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:07.864312 kubelet[1950]: E0517 00:49:07.863090 1950 configmap.go:193] Couldn't get configMap calico-system/whisker-ca-bundle: failed to sync configmap cache: timed out waiting for the condition May 17 00:49:07.864312 kubelet[1950]: E0517 00:49:07.863233 1950 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle podName:b40980c3-26b1-4e2f-b65e-d6ba9d50877d nodeName:}" failed. No retries permitted until 2025-05-17 00:49:08.363195702 +0000 UTC m=+36.204168977 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "whisker-ca-bundle" (UniqueName: "kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle") pod "whisker-b97559666-s7gpw" (UID: "b40980c3-26b1-4e2f-b65e-d6ba9d50877d") : failed to sync configmap cache: timed out waiting for the condition May 17 00:49:07.890810 kubelet[1950]: E0517 00:49:07.890735 1950 secret.go:189] Couldn't get secret calico-system/whisker-backend-key-pair: failed to sync secret cache: timed out waiting for the condition May 17 00:49:07.891046 kubelet[1950]: E0517 00:49:07.890889 1950 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair podName:b40980c3-26b1-4e2f-b65e-d6ba9d50877d nodeName:}" failed. No retries permitted until 2025-05-17 00:49:08.390862962 +0000 UTC m=+36.231836225 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "whisker-backend-key-pair" (UniqueName: "kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair") pod "whisker-b97559666-s7gpw" (UID: "b40980c3-26b1-4e2f-b65e-d6ba9d50877d") : failed to sync secret cache: timed out waiting for the condition May 17 00:49:07.910486 env[1186]: time="2025-05-17T00:49:07.910409692Z" level=error msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" failed" error="failed to destroy network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.910997 env[1186]: time="2025-05-17T00:49:07.910832758Z" level=error msg="Failed to destroy network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.911655 kubelet[1950]: E0517 00:49:07.911526 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:07.911757 kubelet[1950]: E0517 00:49:07.911660 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6"} May 17 00:49:07.911805 kubelet[1950]: E0517 00:49:07.911765 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3461bd46-ccb4-49ae-adb8-d3251ec9543b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:07.911899 kubelet[1950]: E0517 00:49:07.911796 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3461bd46-ccb4-49ae-adb8-d3251ec9543b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ddxgk" podUID="3461bd46-ccb4-49ae-adb8-d3251ec9543b" May 17 00:49:07.912014 env[1186]: time="2025-05-17T00:49:07.911570949Z" level=error msg="encountered an error cleaning up failed sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.912446 env[1186]: time="2025-05-17T00:49:07.912403417Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gkf98,Uid:bf62d9e0-554d-4665-aa65-a32531beade4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.912875 kubelet[1950]: E0517 00:49:07.912841 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.912964 kubelet[1950]: E0517 00:49:07.912903 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gkf98" May 17 00:49:07.912964 kubelet[1950]: E0517 00:49:07.912924 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gkf98" May 17 00:49:07.913053 kubelet[1950]: E0517 00:49:07.912973 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gkf98_calico-system(bf62d9e0-554d-4665-aa65-a32531beade4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gkf98_calico-system(bf62d9e0-554d-4665-aa65-a32531beade4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:49:07.927969 env[1186]: time="2025-05-17T00:49:07.927888901Z" level=error msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" failed" error="failed to destroy network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.928576 kubelet[1950]: E0517 00:49:07.928519 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:07.928784 kubelet[1950]: E0517 00:49:07.928616 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e"} May 17 00:49:07.928784 kubelet[1950]: E0517 00:49:07.928676 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"996c6d29-266c-48b3-a5d3-e06154625b48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:07.928784 kubelet[1950]: E0517 00:49:07.928710 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"996c6d29-266c-48b3-a5d3-e06154625b48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" podUID="996c6d29-266c-48b3-a5d3-e06154625b48" May 17 00:49:07.932615 env[1186]: time="2025-05-17T00:49:07.932513015Z" level=error msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" failed" error="failed to destroy network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:07.933316 kubelet[1950]: E0517 00:49:07.933245 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:07.933475 kubelet[1950]: E0517 00:49:07.933428 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d"} May 17 00:49:07.933563 kubelet[1950]: E0517 00:49:07.933509 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"27c3d624-d977-468e-a5a3-c72cbb3b2e4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:07.933737 kubelet[1950]: E0517 00:49:07.933549 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"27c3d624-d977-468e-a5a3-c72cbb3b2e4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" podUID="27c3d624-d977-468e-a5a3-c72cbb3b2e4d" May 17 00:49:08.504979 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f-shm.mount: Deactivated successfully. May 17 00:49:08.714736 kubelet[1950]: I0517 00:49:08.714673 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:08.716966 env[1186]: time="2025-05-17T00:49:08.716914299Z" level=info msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" May 17 00:49:08.718749 kubelet[1950]: I0517 00:49:08.718686 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:08.722709 env[1186]: time="2025-05-17T00:49:08.722655251Z" level=info msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" May 17 00:49:08.731320 kubelet[1950]: I0517 00:49:08.731278 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:08.735165 env[1186]: time="2025-05-17T00:49:08.735119896Z" level=info msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" May 17 00:49:08.812110 env[1186]: time="2025-05-17T00:49:08.811140411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b97559666-s7gpw,Uid:b40980c3-26b1-4e2f-b65e-d6ba9d50877d,Namespace:calico-system,Attempt:0,}" May 17 00:49:08.882393 env[1186]: time="2025-05-17T00:49:08.882281532Z" level=error msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" failed" error="failed to destroy network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:08.883159 kubelet[1950]: E0517 00:49:08.882886 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:08.883159 kubelet[1950]: E0517 00:49:08.882985 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2"} May 17 00:49:08.883159 kubelet[1950]: E0517 00:49:08.883050 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bca9900e-9230-46ca-a87f-24baf2ab2a74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:08.883159 kubelet[1950]: E0517 00:49:08.883113 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bca9900e-9230-46ca-a87f-24baf2ab2a74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86d6858c89-btznn" podUID="bca9900e-9230-46ca-a87f-24baf2ab2a74" May 17 00:49:08.886506 env[1186]: time="2025-05-17T00:49:08.886406841Z" level=error msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" failed" error="failed to destroy network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:08.887386 kubelet[1950]: E0517 00:49:08.887138 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:08.887386 kubelet[1950]: E0517 00:49:08.887274 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f"} May 17 00:49:08.887386 kubelet[1950]: E0517 00:49:08.887313 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bf62d9e0-554d-4665-aa65-a32531beade4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:08.887386 kubelet[1950]: E0517 00:49:08.887348 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bf62d9e0-554d-4665-aa65-a32531beade4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gkf98" podUID="bf62d9e0-554d-4665-aa65-a32531beade4" May 17 00:49:08.964906 env[1186]: time="2025-05-17T00:49:08.964817006Z" level=error msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" failed" error="failed to destroy network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:08.965954 kubelet[1950]: E0517 00:49:08.965560 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:08.965954 kubelet[1950]: E0517 00:49:08.965693 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1"} May 17 00:49:08.965954 kubelet[1950]: E0517 00:49:08.965757 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58e0b9ad-f250-4b99-a906-e77515643e8e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:08.965954 kubelet[1950]: E0517 00:49:08.965799 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58e0b9ad-f250-4b99-a906-e77515643e8e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-797cd" podUID="58e0b9ad-f250-4b99-a906-e77515643e8e" May 17 00:49:09.055642 env[1186]: time="2025-05-17T00:49:09.055518602Z" level=error msg="Failed to destroy network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:09.059293 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b-shm.mount: Deactivated successfully. May 17 00:49:09.061153 env[1186]: time="2025-05-17T00:49:09.061044991Z" level=error msg="encountered an error cleaning up failed sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:09.061411 env[1186]: time="2025-05-17T00:49:09.061162363Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b97559666-s7gpw,Uid:b40980c3-26b1-4e2f-b65e-d6ba9d50877d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:09.067773 kubelet[1950]: E0517 00:49:09.061746 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:09.067773 kubelet[1950]: E0517 00:49:09.062053 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-b97559666-s7gpw" May 17 00:49:09.067773 kubelet[1950]: E0517 00:49:09.062151 1950 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-b97559666-s7gpw" May 17 00:49:09.068394 kubelet[1950]: E0517 00:49:09.062254 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-b97559666-s7gpw_calico-system(b40980c3-26b1-4e2f-b65e-d6ba9d50877d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-b97559666-s7gpw_calico-system(b40980c3-26b1-4e2f-b65e-d6ba9d50877d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-b97559666-s7gpw" podUID="b40980c3-26b1-4e2f-b65e-d6ba9d50877d" May 17 00:49:09.737001 kubelet[1950]: I0517 00:49:09.735028 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:09.739208 env[1186]: time="2025-05-17T00:49:09.739134176Z" level=info msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" May 17 00:49:09.819729 env[1186]: time="2025-05-17T00:49:09.819632887Z" level=error msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" failed" error="failed to destroy network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:09.820323 kubelet[1950]: E0517 00:49:09.820110 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:09.820323 kubelet[1950]: E0517 00:49:09.820175 1950 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b"} May 17 00:49:09.820323 kubelet[1950]: E0517 00:49:09.820218 1950 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:09.820323 kubelet[1950]: E0517 00:49:09.820249 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-b97559666-s7gpw" podUID="b40980c3-26b1-4e2f-b65e-d6ba9d50877d" May 17 00:49:14.932765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1067147504.mount: Deactivated successfully. May 17 00:49:14.969538 env[1186]: time="2025-05-17T00:49:14.969480536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:14.973122 env[1186]: time="2025-05-17T00:49:14.973066243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:14.975941 env[1186]: time="2025-05-17T00:49:14.975884990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:14.978901 env[1186]: time="2025-05-17T00:49:14.978851273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:14.979880 env[1186]: time="2025-05-17T00:49:14.979834164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:49:15.019672 env[1186]: time="2025-05-17T00:49:15.018055165Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:49:15.039132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1802942113.mount: Deactivated successfully. May 17 00:49:15.045299 env[1186]: time="2025-05-17T00:49:15.045190892Z" level=info msg="CreateContainer within sandbox \"9dc7bef52eb7ef6a0e4c6b0d475c325b6ab0175ecdab43e4ef1c68ea79cab006\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59\"" May 17 00:49:15.049003 env[1186]: time="2025-05-17T00:49:15.048935760Z" level=info msg="StartContainer for \"241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59\"" May 17 00:49:15.084444 systemd[1]: Started cri-containerd-241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59.scope. May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.134493 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:49:15.134624 kernel: audit: type=1400 audit(1747442955.132:1028): avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143928 kernel: audit: type=1300 audit(1747442955.132:1028): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f362c46bd58 items=0 ppid=2409 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.144083 kernel: audit: type=1327 audit(1747442955.132:1028): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316335303939343731303737333965623132613233623432306637 May 17 00:49:15.132000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f362c46bd58 items=0 ppid=2409 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316335303939343731303737333965623132613233623432306637 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.152086 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.152219 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.155236 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.161686 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.162304 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.169499 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.174676 kernel: audit: type=1400 audit(1747442955.132:1029): avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.132000 audit: BPF prog-id=139 op=LOAD May 17 00:49:15.132000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003461f8 items=0 ppid=2409 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316335303939343731303737333965623132613233623432306637 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.143000 audit: BPF prog-id=140 op=LOAD May 17 00:49:15.143000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000097708 items=0 ppid=2409 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316335303939343731303737333965623132613233623432306637 May 17 00:49:15.151000 audit: BPF prog-id=140 op=UNLOAD May 17 00:49:15.151000 audit: BPF prog-id=139 op=UNLOAD May 17 00:49:15.151000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:15.151000 audit: BPF prog-id=141 op=LOAD May 17 00:49:15.151000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000097798 items=0 ppid=2409 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316335303939343731303737333965623132613233623432306637 May 17 00:49:15.197669 env[1186]: time="2025-05-17T00:49:15.195233939Z" level=info msg="StartContainer for \"241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59\" returns successfully" May 17 00:49:15.400444 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:49:15.400681 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:49:15.700080 env[1186]: time="2025-05-17T00:49:15.700030406Z" level=info msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" May 17 00:49:15.796134 kubelet[1950]: I0517 00:49:15.793642 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vdwcw" podStartSLOduration=1.548149966 podStartE2EDuration="20.789096435s" podCreationTimestamp="2025-05-17 00:48:55 +0000 UTC" firstStartedPulling="2025-05-17 00:48:55.741167651 +0000 UTC m=+23.582140925" lastFinishedPulling="2025-05-17 00:49:14.982114117 +0000 UTC m=+42.823087394" observedRunningTime="2025-05-17 00:49:15.788916044 +0000 UTC m=+43.629889329" watchObservedRunningTime="2025-05-17 00:49:15.789096435 +0000 UTC m=+43.630069751" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.907 [INFO][3134] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.907 [INFO][3134] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" iface="eth0" netns="/var/run/netns/cni-c0765694-5066-3ea0-0eaf-0b4fe99821c9" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.908 [INFO][3134] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" iface="eth0" netns="/var/run/netns/cni-c0765694-5066-3ea0-0eaf-0b4fe99821c9" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.909 [INFO][3134] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" iface="eth0" netns="/var/run/netns/cni-c0765694-5066-3ea0-0eaf-0b4fe99821c9" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.909 [INFO][3134] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:15.909 [INFO][3134] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.118 [INFO][3162] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.121 [INFO][3162] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.122 [INFO][3162] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.136 [WARNING][3162] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.136 [INFO][3162] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.138 [INFO][3162] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:16.144054 env[1186]: 2025-05-17 00:49:16.141 [INFO][3134] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:16.148289 systemd[1]: run-netns-cni\x2dc0765694\x2d5066\x2d3ea0\x2d0eaf\x2d0b4fe99821c9.mount: Deactivated successfully. May 17 00:49:16.149721 env[1186]: time="2025-05-17T00:49:16.149670945Z" level=info msg="TearDown network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" successfully" May 17 00:49:16.149887 env[1186]: time="2025-05-17T00:49:16.149860206Z" level=info msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" returns successfully" May 17 00:49:16.164500 kubelet[1950]: I0517 00:49:16.164429 1950 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ktxtv\" (UniqueName: \"kubernetes.io/projected/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-kube-api-access-ktxtv\") pod \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " May 17 00:49:16.164805 kubelet[1950]: I0517 00:49:16.164780 1950 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair\") pod \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " May 17 00:49:16.164982 kubelet[1950]: I0517 00:49:16.164966 1950 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle\") pod \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\" (UID: \"b40980c3-26b1-4e2f-b65e-d6ba9d50877d\") " May 17 00:49:16.188247 systemd[1]: var-lib-kubelet-pods-b40980c3\x2d26b1\x2d4e2f\x2db65e\x2dd6ba9d50877d-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:49:16.191140 kubelet[1950]: I0517 00:49:16.190118 1950 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "b40980c3-26b1-4e2f-b65e-d6ba9d50877d" (UID: "b40980c3-26b1-4e2f-b65e-d6ba9d50877d"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:49:16.191366 kubelet[1950]: I0517 00:49:16.184549 1950 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "b40980c3-26b1-4e2f-b65e-d6ba9d50877d" (UID: "b40980c3-26b1-4e2f-b65e-d6ba9d50877d"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:49:16.196239 systemd[1]: var-lib-kubelet-pods-b40980c3\x2d26b1\x2d4e2f\x2db65e\x2dd6ba9d50877d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dktxtv.mount: Deactivated successfully. May 17 00:49:16.198234 kubelet[1950]: I0517 00:49:16.198180 1950 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-kube-api-access-ktxtv" (OuterVolumeSpecName: "kube-api-access-ktxtv") pod "b40980c3-26b1-4e2f-b65e-d6ba9d50877d" (UID: "b40980c3-26b1-4e2f-b65e-d6ba9d50877d"). InnerVolumeSpecName "kube-api-access-ktxtv". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:49:16.265584 kubelet[1950]: I0517 00:49:16.265517 1950 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-ktxtv\" (UniqueName: \"kubernetes.io/projected/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-kube-api-access-ktxtv\") on node \"ci-3510.3.7-n-f656071047\" DevicePath \"\"" May 17 00:49:16.265949 kubelet[1950]: I0517 00:49:16.265917 1950 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-f656071047\" DevicePath \"\"" May 17 00:49:16.266198 kubelet[1950]: I0517 00:49:16.266179 1950 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b40980c3-26b1-4e2f-b65e-d6ba9d50877d-whisker-ca-bundle\") on node \"ci-3510.3.7-n-f656071047\" DevicePath \"\"" May 17 00:49:16.477137 systemd[1]: Removed slice kubepods-besteffort-podb40980c3_26b1_4e2f_b65e_d6ba9d50877d.slice. May 17 00:49:16.920448 systemd[1]: Created slice kubepods-besteffort-podae796357_26e6_4919_9e04_f9f1860c2cb8.slice. May 17 00:49:16.933678 systemd[1]: run-containerd-runc-k8s.io-241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59-runc.LmGBId.mount: Deactivated successfully. May 17 00:49:16.974866 kubelet[1950]: I0517 00:49:16.974815 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvpjc\" (UniqueName: \"kubernetes.io/projected/ae796357-26e6-4919-9e04-f9f1860c2cb8-kube-api-access-xvpjc\") pod \"whisker-769dd55968-l5tmw\" (UID: \"ae796357-26e6-4919-9e04-f9f1860c2cb8\") " pod="calico-system/whisker-769dd55968-l5tmw" May 17 00:49:16.975440 kubelet[1950]: I0517 00:49:16.975414 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ae796357-26e6-4919-9e04-f9f1860c2cb8-whisker-ca-bundle\") pod \"whisker-769dd55968-l5tmw\" (UID: \"ae796357-26e6-4919-9e04-f9f1860c2cb8\") " pod="calico-system/whisker-769dd55968-l5tmw" May 17 00:49:16.975634 kubelet[1950]: I0517 00:49:16.975610 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ae796357-26e6-4919-9e04-f9f1860c2cb8-whisker-backend-key-pair\") pod \"whisker-769dd55968-l5tmw\" (UID: \"ae796357-26e6-4919-9e04-f9f1860c2cb8\") " pod="calico-system/whisker-769dd55968-l5tmw" May 17 00:49:17.180000 audit[3254]: AVC avc: denied { write } for pid=3254 comm="tee" name="fd" dev="proc" ino=25126 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.180000 audit[3254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff658dd7bc a2=241 a3=1b6 items=1 ppid=3218 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.180000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:49:17.180000 audit: PATH item=0 name="/dev/fd/63" inode=24371 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.199000 audit[3251]: AVC avc: denied { write } for pid=3251 comm="tee" name="fd" dev="proc" ino=25135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.199000 audit[3251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfd7877ad a2=241 a3=1b6 items=1 ppid=3217 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.199000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:49:17.199000 audit: PATH item=0 name="/dev/fd/63" inode=24370 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.199000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.211000 audit[3266]: AVC avc: denied { write } for pid=3266 comm="tee" name="fd" dev="proc" ino=25143 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.211000 audit[3266]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd3ca17bc a2=241 a3=1b6 items=1 ppid=3220 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.211000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:49:17.211000 audit: PATH item=0 name="/dev/fd/63" inode=24382 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.211000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.217000 audit[3259]: AVC avc: denied { write } for pid=3259 comm="tee" name="fd" dev="proc" ino=24387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.223000 audit[3248]: AVC avc: denied { write } for pid=3248 comm="tee" name="fd" dev="proc" ino=24390 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.217000 audit[3259]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9216f7be a2=241 a3=1b6 items=1 ppid=3210 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.217000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:49:17.217000 audit: PATH item=0 name="/dev/fd/63" inode=25129 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.217000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.223000 audit[3248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1f3f77ac a2=241 a3=1b6 items=1 ppid=3222 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.223000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:49:17.223000 audit: PATH item=0 name="/dev/fd/63" inode=25119 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.223000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.234400 env[1186]: time="2025-05-17T00:49:17.234332399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-769dd55968-l5tmw,Uid:ae796357-26e6-4919-9e04-f9f1860c2cb8,Namespace:calico-system,Attempt:0,}" May 17 00:49:17.248000 audit[3269]: AVC avc: denied { write } for pid=3269 comm="tee" name="fd" dev="proc" ino=24417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.248000 audit[3269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcb1a27bd a2=241 a3=1b6 items=1 ppid=3213 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.248000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:49:17.248000 audit: PATH item=0 name="/dev/fd/63" inode=24383 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.248000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.341000 audit[3285]: AVC avc: denied { write } for pid=3285 comm="tee" name="fd" dev="proc" ino=25156 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:49:17.341000 audit[3285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1242f7bc a2=241 a3=1b6 items=1 ppid=3241 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.341000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:49:17.341000 audit: PATH item=0 name="/dev/fd/63" inode=25147 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.341000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:49:17.520267 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:17.520465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali025548eae26: link becomes ready May 17 00:49:17.533999 systemd-networkd[1002]: cali025548eae26: Link UP May 17 00:49:17.536426 systemd-networkd[1002]: cali025548eae26: Gained carrier May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.321 [INFO][3287] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.348 [INFO][3287] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0 whisker-769dd55968- calico-system ae796357-26e6-4919-9e04-f9f1860c2cb8 908 0 2025-05-17 00:49:16 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:769dd55968 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 whisker-769dd55968-l5tmw eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali025548eae26 [] [] }} ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.348 [INFO][3287] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.419 [INFO][3301] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" HandleID="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.420 [INFO][3301] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" HandleID="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f656071047", "pod":"whisker-769dd55968-l5tmw", "timestamp":"2025-05-17 00:49:17.419940386 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.420 [INFO][3301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.420 [INFO][3301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.420 [INFO][3301] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.435 [INFO][3301] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.452 [INFO][3301] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.462 [INFO][3301] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.466 [INFO][3301] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.471 [INFO][3301] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.471 [INFO][3301] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.474 [INFO][3301] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.482 [INFO][3301] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.495 [INFO][3301] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.1/26] block=192.168.111.0/26 handle="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.496 [INFO][3301] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.1/26] handle="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" host="ci-3510.3.7-n-f656071047" May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.496 [INFO][3301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.559730 env[1186]: 2025-05-17 00:49:17.496 [INFO][3301] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.1/26] IPv6=[] ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" HandleID="k8s-pod-network.ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.501 [INFO][3287] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0", GenerateName:"whisker-769dd55968-", Namespace:"calico-system", SelfLink:"", UID:"ae796357-26e6-4919-9e04-f9f1860c2cb8", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"769dd55968", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"whisker-769dd55968-l5tmw", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.111.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali025548eae26", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.501 [INFO][3287] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.1/32] ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.501 [INFO][3287] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali025548eae26 ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.519 [INFO][3287] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.519 [INFO][3287] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0", GenerateName:"whisker-769dd55968-", Namespace:"calico-system", SelfLink:"", UID:"ae796357-26e6-4919-9e04-f9f1860c2cb8", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"769dd55968", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da", Pod:"whisker-769dd55968-l5tmw", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.111.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali025548eae26", MAC:"22:37:d2:79:02:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.561398 env[1186]: 2025-05-17 00:49:17.554 [INFO][3287] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da" Namespace="calico-system" Pod="whisker-769dd55968-l5tmw" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--769dd55968--l5tmw-eth0" May 17 00:49:17.588228 env[1186]: time="2025-05-17T00:49:17.588075249Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:17.588228 env[1186]: time="2025-05-17T00:49:17.588162315Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:17.588228 env[1186]: time="2025-05-17T00:49:17.588181523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:17.589195 env[1186]: time="2025-05-17T00:49:17.589117044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da pid=3323 runtime=io.containerd.runc.v2 May 17 00:49:17.617460 systemd[1]: Started cri-containerd-ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da.scope. May 17 00:49:17.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit: BPF prog-id=142 op=LOAD May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3323 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323361366462623332333937386361313165613037656562363364 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3323 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323361366462623332333937386361313165613037656562363364 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.665000 audit: BPF prog-id=143 op=LOAD May 17 00:49:17.665000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261ce0 items=0 ppid=3323 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323361366462623332333937386361313165613037656562363364 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit: BPF prog-id=144 op=LOAD May 17 00:49:17.666000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261d28 items=0 ppid=3323 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323361366462623332333937386361313165613037656562363364 May 17 00:49:17.666000 audit: BPF prog-id=144 op=UNLOAD May 17 00:49:17.666000 audit: BPF prog-id=143 op=UNLOAD May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:17.666000 audit: BPF prog-id=145 op=LOAD May 17 00:49:17.666000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000364138 items=0 ppid=3323 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323361366462623332333937386361313165613037656562363364 May 17 00:49:17.797754 env[1186]: time="2025-05-17T00:49:17.794454383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-769dd55968-l5tmw,Uid:ae796357-26e6-4919-9e04-f9f1860c2cb8,Namespace:calico-system,Attempt:0,} returns sandbox id \"ca23a6dbb323978ca11ea07eeb63dd335a27a1a24597fe54c99b4e1cf306d0da\"" May 17 00:49:17.805674 env[1186]: time="2025-05-17T00:49:17.805584966Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:18.012559 env[1186]: time="2025-05-17T00:49:18.012462892Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:18.013767 env[1186]: time="2025-05-17T00:49:18.013681646Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:18.014281 kubelet[1950]: E0517 00:49:18.014192 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:18.014981 kubelet[1950]: E0517 00:49:18.014322 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:18.023283 kubelet[1950]: E0517 00:49:18.023198 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ec5b00b99e7c48b0837097a3f87732db,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:18.026289 env[1186]: time="2025-05-17T00:49:18.026237723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:18.236661 env[1186]: time="2025-05-17T00:49:18.236556219Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:18.237472 env[1186]: time="2025-05-17T00:49:18.237405708Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:18.237961 kubelet[1950]: E0517 00:49:18.237914 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:18.238248 kubelet[1950]: E0517 00:49:18.238215 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:18.238844 kubelet[1950]: E0517 00:49:18.238774 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:18.240368 kubelet[1950]: E0517 00:49:18.240288 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:49:18.461351 env[1186]: time="2025-05-17T00:49:18.460687637Z" level=info msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" May 17 00:49:18.467322 kubelet[1950]: I0517 00:49:18.467256 1950 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="b40980c3-26b1-4e2f-b65e-d6ba9d50877d" path="/var/lib/kubelet/pods/b40980c3-26b1-4e2f-b65e-d6ba9d50877d/volumes" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.543 [INFO][3394] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.544 [INFO][3394] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" iface="eth0" netns="/var/run/netns/cni-8704747f-41a9-a5d7-f192-d8605bd0aa21" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.544 [INFO][3394] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" iface="eth0" netns="/var/run/netns/cni-8704747f-41a9-a5d7-f192-d8605bd0aa21" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.544 [INFO][3394] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" iface="eth0" netns="/var/run/netns/cni-8704747f-41a9-a5d7-f192-d8605bd0aa21" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.544 [INFO][3394] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.544 [INFO][3394] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.585 [INFO][3402] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.586 [INFO][3402] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.586 [INFO][3402] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.594 [WARNING][3402] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.594 [INFO][3402] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.597 [INFO][3402] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.604100 env[1186]: 2025-05-17 00:49:18.600 [INFO][3394] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:18.608789 systemd[1]: run-netns-cni\x2d8704747f\x2d41a9\x2da5d7\x2df192\x2dd8605bd0aa21.mount: Deactivated successfully. May 17 00:49:18.610424 env[1186]: time="2025-05-17T00:49:18.610118285Z" level=info msg="TearDown network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" successfully" May 17 00:49:18.610424 env[1186]: time="2025-05-17T00:49:18.610235265Z" level=info msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" returns successfully" May 17 00:49:18.611492 env[1186]: time="2025-05-17T00:49:18.611447224Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-qvcxd,Uid:e695e6ca-70af-4c0a-aa8b-bbd459269076,Namespace:calico-system,Attempt:1,}" May 17 00:49:18.786497 kubelet[1950]: E0517 00:49:18.786424 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:49:18.886982 systemd-networkd[1002]: calicf3bf59d84e: Link UP May 17 00:49:18.892395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:18.892546 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicf3bf59d84e: link becomes ready May 17 00:49:18.891537 systemd-networkd[1002]: calicf3bf59d84e: Gained carrier May 17 00:49:18.916000 audit[3442]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.916000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdbd80fa00 a2=0 a3=7ffdbd80f9ec items=0 ppid=2068 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.674 [INFO][3409] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.698 [INFO][3409] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0 goldmane-8f77d7b6c- calico-system e695e6ca-70af-4c0a-aa8b-bbd459269076 923 0 2025-05-17 00:48:55 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 goldmane-8f77d7b6c-qvcxd eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calicf3bf59d84e [] [] }} ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.699 [INFO][3409] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.762 [INFO][3421] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" HandleID="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.762 [INFO][3421] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" HandleID="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f656071047", "pod":"goldmane-8f77d7b6c-qvcxd", "timestamp":"2025-05-17 00:49:18.76231344 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.763 [INFO][3421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.763 [INFO][3421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.763 [INFO][3421] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.780 [INFO][3421] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.806 [INFO][3421] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.827 [INFO][3421] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.831 [INFO][3421] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.837 [INFO][3421] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.838 [INFO][3421] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.842 [INFO][3421] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292 May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.849 [INFO][3421] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.862 [INFO][3421] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.2/26] block=192.168.111.0/26 handle="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.862 [INFO][3421] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.2/26] handle="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" host="ci-3510.3.7-n-f656071047" May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.862 [INFO][3421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.926345 env[1186]: 2025-05-17 00:49:18.862 [INFO][3421] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.2/26] IPv6=[] ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" HandleID="k8s-pod-network.d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.865 [INFO][3409] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"e695e6ca-70af-4c0a-aa8b-bbd459269076", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"goldmane-8f77d7b6c-qvcxd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicf3bf59d84e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.866 [INFO][3409] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.2/32] ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.866 [INFO][3409] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicf3bf59d84e ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.900 [INFO][3409] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.900 [INFO][3409] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"e695e6ca-70af-4c0a-aa8b-bbd459269076", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292", Pod:"goldmane-8f77d7b6c-qvcxd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicf3bf59d84e", MAC:"72:cf:f3:6f:e8:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.927619 env[1186]: 2025-05-17 00:49:18.921 [INFO][3409] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292" Namespace="calico-system" Pod="goldmane-8f77d7b6c-qvcxd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:18.930000 audit[3442]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.930000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdbd80fa00 a2=0 a3=0 items=0 ppid=2068 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.947938 env[1186]: time="2025-05-17T00:49:18.947795123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:18.947938 env[1186]: time="2025-05-17T00:49:18.947880718Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:18.948225 env[1186]: time="2025-05-17T00:49:18.947899841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:18.948626 env[1186]: time="2025-05-17T00:49:18.948564023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292 pid=3457 runtime=io.containerd.runc.v2 May 17 00:49:18.994793 systemd[1]: Started cri-containerd-d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292.scope. May 17 00:49:19.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.031000 audit: BPF prog-id=146 op=LOAD May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3457 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432353466363966396231613465396564363466323230636639663238 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3457 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432353466363966396231613465396564363466323230636639663238 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.033000 audit: BPF prog-id=147 op=LOAD May 17 00:49:19.033000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000220530 items=0 ppid=3457 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432353466363966396231613465396564363466323230636639663238 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.034000 audit: BPF prog-id=148 op=LOAD May 17 00:49:19.034000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000220578 items=0 ppid=3457 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432353466363966396231613465396564363466323230636639663238 May 17 00:49:19.034000 audit: BPF prog-id=148 op=UNLOAD May 17 00:49:19.035000 audit: BPF prog-id=147 op=UNLOAD May 17 00:49:19.035000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:19.035000 audit: BPF prog-id=149 op=LOAD May 17 00:49:19.035000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000220988 items=0 ppid=3457 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432353466363966396231613465396564363466323230636639663238 May 17 00:49:19.118826 env[1186]: time="2025-05-17T00:49:19.118715570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-qvcxd,Uid:e695e6ca-70af-4c0a-aa8b-bbd459269076,Namespace:calico-system,Attempt:1,} returns sandbox id \"d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292\"" May 17 00:49:19.121540 env[1186]: time="2025-05-17T00:49:19.121488519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:19.347300 env[1186]: time="2025-05-17T00:49:19.347083635Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:19.349307 env[1186]: time="2025-05-17T00:49:19.349199382Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:19.350443 kubelet[1950]: E0517 00:49:19.349944 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:19.350443 kubelet[1950]: E0517 00:49:19.350203 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:19.353418 kubelet[1950]: E0517 00:49:19.353338 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5cz4l,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:19.355014 kubelet[1950]: E0517 00:49:19.354950 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:19.463161 env[1186]: time="2025-05-17T00:49:19.463112574Z" level=info msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" May 17 00:49:19.463507 env[1186]: time="2025-05-17T00:49:19.463141877Z" level=info msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" May 17 00:49:19.492883 systemd-networkd[1002]: cali025548eae26: Gained IPv6LL May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.552 [INFO][3514] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.553 [INFO][3514] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" iface="eth0" netns="/var/run/netns/cni-762fe425-2415-a4cd-0478-9d64fcbfc065" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.553 [INFO][3514] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" iface="eth0" netns="/var/run/netns/cni-762fe425-2415-a4cd-0478-9d64fcbfc065" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.553 [INFO][3514] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" iface="eth0" netns="/var/run/netns/cni-762fe425-2415-a4cd-0478-9d64fcbfc065" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.553 [INFO][3514] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.553 [INFO][3514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.644 [INFO][3527] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.645 [INFO][3527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.645 [INFO][3527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.656 [WARNING][3527] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.656 [INFO][3527] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.659 [INFO][3527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:19.668481 env[1186]: 2025-05-17 00:49:19.665 [INFO][3514] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:19.669759 env[1186]: time="2025-05-17T00:49:19.669673701Z" level=info msg="TearDown network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" successfully" May 17 00:49:19.670046 env[1186]: time="2025-05-17T00:49:19.669978289Z" level=info msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" returns successfully" May 17 00:49:19.673574 systemd[1]: run-netns-cni\x2d762fe425\x2d2415\x2da4cd\x2d0478\x2d9d64fcbfc065.mount: Deactivated successfully. May 17 00:49:19.677410 env[1186]: time="2025-05-17T00:49:19.677317953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86d6858c89-btznn,Uid:bca9900e-9230-46ca-a87f-24baf2ab2a74,Namespace:calico-system,Attempt:1,}" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.605 [INFO][3521] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.605 [INFO][3521] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" iface="eth0" netns="/var/run/netns/cni-9bbe06a5-3ac3-ae6a-4d00-d8b4628a4037" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.606 [INFO][3521] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" iface="eth0" netns="/var/run/netns/cni-9bbe06a5-3ac3-ae6a-4d00-d8b4628a4037" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.606 [INFO][3521] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" iface="eth0" netns="/var/run/netns/cni-9bbe06a5-3ac3-ae6a-4d00-d8b4628a4037" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.606 [INFO][3521] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.606 [INFO][3521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.653 [INFO][3535] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.654 [INFO][3535] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.660 [INFO][3535] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.680 [WARNING][3535] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.681 [INFO][3535] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.687 [INFO][3535] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:19.709866 env[1186]: 2025-05-17 00:49:19.691 [INFO][3521] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:19.711204 env[1186]: time="2025-05-17T00:49:19.711134382Z" level=info msg="TearDown network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" successfully" May 17 00:49:19.711410 env[1186]: time="2025-05-17T00:49:19.711372992Z" level=info msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" returns successfully" May 17 00:49:19.712362 kubelet[1950]: E0517 00:49:19.712048 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:19.714301 env[1186]: time="2025-05-17T00:49:19.712996795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ddxgk,Uid:3461bd46-ccb4-49ae-adb8-d3251ec9543b,Namespace:kube-system,Attempt:1,}" May 17 00:49:19.795404 kubelet[1950]: E0517 00:49:19.794860 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:19.802288 kubelet[1950]: E0517 00:49:19.801203 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:49:19.961976 systemd[1]: run-netns-cni\x2d9bbe06a5\x2d3ac3\x2dae6a\x2d4d00\x2dd8b4628a4037.mount: Deactivated successfully. May 17 00:49:20.089748 systemd-networkd[1002]: cali5be5b6ea32e: Link UP May 17 00:49:20.099083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:20.099283 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5be5b6ea32e: link becomes ready May 17 00:49:20.099631 systemd-networkd[1002]: cali5be5b6ea32e: Gained carrier May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.755 [INFO][3545] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.772 [INFO][3545] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0 calico-kube-controllers-86d6858c89- calico-system bca9900e-9230-46ca-a87f-24baf2ab2a74 942 0 2025-05-17 00:48:55 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:86d6858c89 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 calico-kube-controllers-86d6858c89-btznn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5be5b6ea32e [] [] }} ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.772 [INFO][3545] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.932 [INFO][3569] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" HandleID="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.932 [INFO][3569] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" HandleID="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332140), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f656071047", "pod":"calico-kube-controllers-86d6858c89-btznn", "timestamp":"2025-05-17 00:49:19.932425518 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.932 [INFO][3569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.933 [INFO][3569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.933 [INFO][3569] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.949 [INFO][3569] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:19.989 [INFO][3569] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.003 [INFO][3569] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.007 [INFO][3569] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.016 [INFO][3569] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.016 [INFO][3569] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.019 [INFO][3569] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12 May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.049 [INFO][3569] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.063 [INFO][3569] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.3/26] block=192.168.111.0/26 handle="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.063 [INFO][3569] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.3/26] handle="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.063 [INFO][3569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:20.148808 env[1186]: 2025-05-17 00:49:20.063 [INFO][3569] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.3/26] IPv6=[] ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" HandleID="k8s-pod-network.dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.070 [INFO][3545] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0", GenerateName:"calico-kube-controllers-86d6858c89-", Namespace:"calico-system", SelfLink:"", UID:"bca9900e-9230-46ca-a87f-24baf2ab2a74", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86d6858c89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"calico-kube-controllers-86d6858c89-btznn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5be5b6ea32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.071 [INFO][3545] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.3/32] ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.071 [INFO][3545] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5be5b6ea32e ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.102 [INFO][3545] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.102 [INFO][3545] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0", GenerateName:"calico-kube-controllers-86d6858c89-", Namespace:"calico-system", SelfLink:"", UID:"bca9900e-9230-46ca-a87f-24baf2ab2a74", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86d6858c89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12", Pod:"calico-kube-controllers-86d6858c89-btznn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5be5b6ea32e", MAC:"ce:60:11:49:9e:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:20.150327 env[1186]: 2025-05-17 00:49:20.142 [INFO][3545] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12" Namespace="calico-system" Pod="calico-kube-controllers-86d6858c89-btznn" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:20.182453 env[1186]: time="2025-05-17T00:49:20.174606366Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:20.182453 env[1186]: time="2025-05-17T00:49:20.174705110Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:20.182453 env[1186]: time="2025-05-17T00:49:20.174722737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:20.182453 env[1186]: time="2025-05-17T00:49:20.174935926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12 pid=3606 runtime=io.containerd.runc.v2 May 17 00:49:20.243928 systemd[1]: run-containerd-runc-k8s.io-dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12-runc.HO395M.mount: Deactivated successfully. May 17 00:49:20.263409 systemd[1]: Started cri-containerd-dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12.scope. May 17 00:49:20.313477 kernel: kauditd_printk_skb: 188 callbacks suppressed May 17 00:49:20.313694 kernel: audit: type=1325 audit(1747442960.291:1079): table=filter:101 family=2 entries=22 op=nft_register_rule pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:20.291000 audit[3598]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:20.327682 kernel: audit: type=1300 audit(1747442960.291:1079): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd2b10f660 a2=0 a3=7ffd2b10f64c items=0 ppid=2068 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.327812 kernel: audit: type=1327 audit(1747442960.291:1079): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:20.291000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd2b10f660 a2=0 a3=7ffd2b10f64c items=0 ppid=2068 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:20.328938 systemd-networkd[1002]: calid2c9f757e53: Link UP May 17 00:49:20.331631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2c9f757e53: link becomes ready May 17 00:49:20.331573 systemd-networkd[1002]: calid2c9f757e53: Gained carrier May 17 00:49:20.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.346862 kernel: audit: type=1400 audit(1747442960.339:1080): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.347019 kernel: audit: type=1400 audit(1747442960.339:1081): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.357712 kernel: audit: type=1400 audit(1747442960.339:1082): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.357881 kernel: audit: type=1400 audit(1747442960.339:1083): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.357922 kernel: audit: type=1400 audit(1747442960.339:1084): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.367701 kernel: audit: type=1400 audit(1747442960.339:1085): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.381687 kernel: audit: type=1400 audit(1747442960.339:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.347000 audit: BPF prog-id=150 op=LOAD May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3606 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326432653730343738656434323535306630383630313462346332 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3606 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326432653730343738656434323535306630383630313462346332 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.348000 audit: BPF prog-id=151 op=LOAD May 17 00:49:20.348000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218650 items=0 ppid=3606 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326432653730343738656434323535306630383630313462346332 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit: BPF prog-id=152 op=LOAD May 17 00:49:20.349000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218698 items=0 ppid=3606 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326432653730343738656434323535306630383630313462346332 May 17 00:49:20.349000 audit: BPF prog-id=152 op=UNLOAD May 17 00:49:20.349000 audit: BPF prog-id=151 op=UNLOAD May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.349000 audit: BPF prog-id=153 op=LOAD May 17 00:49:20.349000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218aa8 items=0 ppid=3606 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326432653730343738656434323535306630383630313462346332 May 17 00:49:20.370000 audit[3598]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:20.370000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd2b10f660 a2=0 a3=0 items=0 ppid=2068 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:19.837 [INFO][3555] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:19.932 [INFO][3555] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0 coredns-7c65d6cfc9- kube-system 3461bd46-ccb4-49ae-adb8-d3251ec9543b 943 0 2025-05-17 00:48:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 coredns-7c65d6cfc9-ddxgk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid2c9f757e53 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:19.932 [INFO][3555] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.041 [INFO][3577] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" HandleID="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.041 [INFO][3577] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" HandleID="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9630), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-f656071047", "pod":"coredns-7c65d6cfc9-ddxgk", "timestamp":"2025-05-17 00:49:20.041448021 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.042 [INFO][3577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.063 [INFO][3577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.063 [INFO][3577] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.103 [INFO][3577] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.153 [INFO][3577] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.172 [INFO][3577] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.195 [INFO][3577] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.248 [INFO][3577] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.248 [INFO][3577] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.264 [INFO][3577] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8 May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.281 [INFO][3577] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.294 [INFO][3577] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.4/26] block=192.168.111.0/26 handle="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.294 [INFO][3577] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.4/26] handle="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" host="ci-3510.3.7-n-f656071047" May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.294 [INFO][3577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:20.396213 env[1186]: 2025-05-17 00:49:20.294 [INFO][3577] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.4/26] IPv6=[] ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" HandleID="k8s-pod-network.da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.297 [INFO][3555] cni-plugin/k8s.go 418: Populated endpoint ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"3461bd46-ccb4-49ae-adb8-d3251ec9543b", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"coredns-7c65d6cfc9-ddxgk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2c9f757e53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.298 [INFO][3555] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.4/32] ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.298 [INFO][3555] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid2c9f757e53 ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.331 [INFO][3555] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.359 [INFO][3555] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"3461bd46-ccb4-49ae-adb8-d3251ec9543b", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8", Pod:"coredns-7c65d6cfc9-ddxgk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2c9f757e53", MAC:"ea:f7:00:31:4a:7e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:20.397488 env[1186]: 2025-05-17 00:49:20.391 [INFO][3555] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ddxgk" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:20.420520 env[1186]: time="2025-05-17T00:49:20.420378456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:20.420886 env[1186]: time="2025-05-17T00:49:20.420820571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:20.421131 env[1186]: time="2025-05-17T00:49:20.421090629Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:20.421629 env[1186]: time="2025-05-17T00:49:20.421558002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8 pid=3654 runtime=io.containerd.runc.v2 May 17 00:49:20.477664 systemd[1]: Started cri-containerd-da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8.scope. May 17 00:49:20.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.526000 audit: BPF prog-id=154 op=LOAD May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3654 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363632323931333038663830613838626365633235303930363061 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3654 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363632323931333038663830613838626365633235303930363061 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.527000 audit: BPF prog-id=155 op=LOAD May 17 00:49:20.532749 env[1186]: time="2025-05-17T00:49:20.532562681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86d6858c89-btznn,Uid:bca9900e-9230-46ca-a87f-24baf2ab2a74,Namespace:calico-system,Attempt:1,} returns sandbox id \"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12\"" May 17 00:49:20.527000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9bf0 items=0 ppid=3654 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363632323931333038663830613838626365633235303930363061 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.542000 audit: BPF prog-id=156 op=LOAD May 17 00:49:20.542000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9c38 items=0 ppid=3654 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363632323931333038663830613838626365633235303930363061 May 17 00:49:20.543000 audit: BPF prog-id=156 op=UNLOAD May 17 00:49:20.543000 audit: BPF prog-id=155 op=UNLOAD May 17 00:49:20.543000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.543000 audit: BPF prog-id=157 op=LOAD May 17 00:49:20.543000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2048 items=0 ppid=3654 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363632323931333038663830613838626365633235303930363061 May 17 00:49:20.551209 env[1186]: time="2025-05-17T00:49:20.542227220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:49:20.611778 env[1186]: time="2025-05-17T00:49:20.611689613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ddxgk,Uid:3461bd46-ccb4-49ae-adb8-d3251ec9543b,Namespace:kube-system,Attempt:1,} returns sandbox id \"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8\"" May 17 00:49:20.612933 kubelet[1950]: E0517 00:49:20.612891 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:20.616645 env[1186]: time="2025-05-17T00:49:20.616550458Z" level=info msg="CreateContainer within sandbox \"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:49:20.636824 env[1186]: time="2025-05-17T00:49:20.636750276Z" level=info msg="CreateContainer within sandbox \"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4f6d04ebc0c0859cf512e3eb3e45a50dc344cb711a9f6bae6c64ef0d69aab6f8\"" May 17 00:49:20.637508 env[1186]: time="2025-05-17T00:49:20.637464385Z" level=info msg="StartContainer for \"4f6d04ebc0c0859cf512e3eb3e45a50dc344cb711a9f6bae6c64ef0d69aab6f8\"" May 17 00:49:20.681117 systemd[1]: Started cri-containerd-4f6d04ebc0c0859cf512e3eb3e45a50dc344cb711a9f6bae6c64ef0d69aab6f8.scope. May 17 00:49:20.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.715000 audit: BPF prog-id=158 op=LOAD May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3654 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366430346562633063303835396366353132653365623365343561 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3654 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366430346562633063303835396366353132653365623365343561 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit: BPF prog-id=159 op=LOAD May 17 00:49:20.716000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032b140 items=0 ppid=3654 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366430346562633063303835396366353132653365623365343561 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit: BPF prog-id=160 op=LOAD May 17 00:49:20.716000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032b188 items=0 ppid=3654 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366430346562633063303835396366353132653365623365343561 May 17 00:49:20.716000 audit: BPF prog-id=160 op=UNLOAD May 17 00:49:20.716000 audit: BPF prog-id=159 op=UNLOAD May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:20.716000 audit: BPF prog-id=161 op=LOAD May 17 00:49:20.716000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032b598 items=0 ppid=3654 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366430346562633063303835396366353132653365623365343561 May 17 00:49:20.758098 env[1186]: time="2025-05-17T00:49:20.757985425Z" level=info msg="StartContainer for \"4f6d04ebc0c0859cf512e3eb3e45a50dc344cb711a9f6bae6c64ef0d69aab6f8\" returns successfully" May 17 00:49:20.793099 kubelet[1950]: E0517 00:49:20.792961 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:20.803809 kubelet[1950]: E0517 00:49:20.803763 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:20.823099 kubelet[1950]: I0517 00:49:20.823010 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-ddxgk" podStartSLOduration=44.822977613 podStartE2EDuration="44.822977613s" podCreationTimestamp="2025-05-17 00:48:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:20.821353074 +0000 UTC m=+48.662326360" watchObservedRunningTime="2025-05-17 00:49:20.822977613 +0000 UTC m=+48.663950899" May 17 00:49:20.837009 systemd-networkd[1002]: calicf3bf59d84e: Gained IPv6LL May 17 00:49:20.876000 audit[3734]: NETFILTER_CFG table=filter:103 family=2 entries=22 op=nft_register_rule pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:20.876000 audit[3734]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff1c0d76c0 a2=0 a3=7fff1c0d76ac items=0 ppid=2068 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:20.886000 audit[3734]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:20.886000 audit[3734]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1c0d76c0 a2=0 a3=0 items=0 ppid=2068 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:20.981000 audit[3717]: AVC avc: denied { getattr } for pid=3717 comm="coredns" path="cgroup:[4026532797]" dev="nsfs" ino=4026532797 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c741 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:49:20.981000 audit[3717]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014aab0 a2=c000497968 a3=0 items=0 ppid=3654 pid=3717 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c741 key=(null) May 17 00:49:20.981000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:49:21.460972 env[1186]: time="2025-05-17T00:49:21.460908350Z" level=info msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" May 17 00:49:21.462405 env[1186]: time="2025-05-17T00:49:21.462351760Z" level=info msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" May 17 00:49:21.605370 systemd-networkd[1002]: cali5be5b6ea32e: Gained IPv6LL May 17 00:49:21.605830 systemd-networkd[1002]: calid2c9f757e53: Gained IPv6LL May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.554 [INFO][3763] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.554 [INFO][3763] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" iface="eth0" netns="/var/run/netns/cni-6807679c-2be5-770e-1065-4aa27b6eedeb" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.555 [INFO][3763] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" iface="eth0" netns="/var/run/netns/cni-6807679c-2be5-770e-1065-4aa27b6eedeb" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.555 [INFO][3763] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" iface="eth0" netns="/var/run/netns/cni-6807679c-2be5-770e-1065-4aa27b6eedeb" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.555 [INFO][3763] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.555 [INFO][3763] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.657 [INFO][3781] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.660 [INFO][3781] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.660 [INFO][3781] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.672 [WARNING][3781] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.672 [INFO][3781] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.676 [INFO][3781] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:21.684166 env[1186]: 2025-05-17 00:49:21.679 [INFO][3763] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:21.685366 env[1186]: time="2025-05-17T00:49:21.685302364Z" level=info msg="TearDown network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" successfully" May 17 00:49:21.685540 env[1186]: time="2025-05-17T00:49:21.685509585Z" level=info msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" returns successfully" May 17 00:49:21.689649 systemd[1]: run-netns-cni\x2d6807679c\x2d2be5\x2d770e\x2d1065\x2d4aa27b6eedeb.mount: Deactivated successfully. May 17 00:49:21.698177 env[1186]: time="2025-05-17T00:49:21.698033904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-xdqfj,Uid:27c3d624-d977-468e-a5a3-c72cbb3b2e4d,Namespace:calico-apiserver,Attempt:1,}" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" iface="eth0" netns="/var/run/netns/cni-eea31235-a2da-41d8-59b5-169ad209b1f6" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" iface="eth0" netns="/var/run/netns/cni-eea31235-a2da-41d8-59b5-169ad209b1f6" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" iface="eth0" netns="/var/run/netns/cni-eea31235-a2da-41d8-59b5-169ad209b1f6" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.594 [INFO][3762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.756 [INFO][3787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.756 [INFO][3787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.756 [INFO][3787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.769 [WARNING][3787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.769 [INFO][3787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.773 [INFO][3787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:21.795824 env[1186]: 2025-05-17 00:49:21.776 [INFO][3762] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:21.796887 env[1186]: time="2025-05-17T00:49:21.796837895Z" level=info msg="TearDown network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" successfully" May 17 00:49:21.797042 env[1186]: time="2025-05-17T00:49:21.797014538Z" level=info msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" returns successfully" May 17 00:49:21.800432 env[1186]: time="2025-05-17T00:49:21.798172846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-7ch5r,Uid:996c6d29-266c-48b3-a5d3-e06154625b48,Namespace:calico-apiserver,Attempt:1,}" May 17 00:49:21.802094 systemd[1]: run-netns-cni\x2deea31235\x2da2da\x2d41d8\x2d59b5\x2d169ad209b1f6.mount: Deactivated successfully. May 17 00:49:21.814655 kubelet[1950]: E0517 00:49:21.814526 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:22.099000 audit[3829]: NETFILTER_CFG table=filter:105 family=2 entries=19 op=nft_register_rule pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.099000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf7891dd0 a2=0 a3=7ffdf7891dbc items=0 ppid=2068 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.123000 audit[3829]: NETFILTER_CFG table=nat:106 family=2 entries=33 op=nft_register_chain pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.123000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffdf7891dd0 a2=0 a3=7ffdf7891dbc items=0 ppid=2068 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.128100 systemd-networkd[1002]: cali60a659cd789: Link UP May 17 00:49:22.139881 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:22.140096 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60a659cd789: link becomes ready May 17 00:49:22.141854 systemd-networkd[1002]: cali60a659cd789: Gained carrier May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:21.866 [INFO][3792] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:21.906 [INFO][3792] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0 calico-apiserver-6d846f879f- calico-apiserver 27c3d624-d977-468e-a5a3-c72cbb3b2e4d 980 0 2025-05-17 00:48:50 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d846f879f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 calico-apiserver-6d846f879f-xdqfj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali60a659cd789 [] [] }} ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:21.906 [INFO][3792] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.000 [INFO][3821] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" HandleID="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.000 [INFO][3821] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" HandleID="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f730), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-f656071047", "pod":"calico-apiserver-6d846f879f-xdqfj", "timestamp":"2025-05-17 00:49:22.00040872 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.000 [INFO][3821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.001 [INFO][3821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.001 [INFO][3821] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.015 [INFO][3821] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.024 [INFO][3821] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.032 [INFO][3821] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.036 [INFO][3821] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.051 [INFO][3821] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.051 [INFO][3821] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.068 [INFO][3821] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.077 [INFO][3821] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.104 [INFO][3821] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.5/26] block=192.168.111.0/26 handle="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.104 [INFO][3821] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.5/26] handle="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.104 [INFO][3821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:22.212218 env[1186]: 2025-05-17 00:49:22.105 [INFO][3821] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.5/26] IPv6=[] ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" HandleID="k8s-pod-network.106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.109 [INFO][3792] cni-plugin/k8s.go 418: Populated endpoint ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"27c3d624-d977-468e-a5a3-c72cbb3b2e4d", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"calico-apiserver-6d846f879f-xdqfj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60a659cd789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.110 [INFO][3792] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.5/32] ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.110 [INFO][3792] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60a659cd789 ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.166 [INFO][3792] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.167 [INFO][3792] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"27c3d624-d977-468e-a5a3-c72cbb3b2e4d", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f", Pod:"calico-apiserver-6d846f879f-xdqfj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60a659cd789", MAC:"b2:45:20:15:b9:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:22.214162 env[1186]: 2025-05-17 00:49:22.195 [INFO][3792] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-xdqfj" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:22.307848 env[1186]: time="2025-05-17T00:49:22.307727598Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:22.308028 env[1186]: time="2025-05-17T00:49:22.307860834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:22.308028 env[1186]: time="2025-05-17T00:49:22.307897645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:22.308198 env[1186]: time="2025-05-17T00:49:22.308144053Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f pid=3861 runtime=io.containerd.runc.v2 May 17 00:49:22.394070 systemd[1]: Started cri-containerd-106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f.scope. May 17 00:49:22.418750 systemd[1]: run-containerd-runc-k8s.io-106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f-runc.SHGRGY.mount: Deactivated successfully. May 17 00:49:22.430704 systemd-networkd[1002]: calie3201fe3750: Link UP May 17 00:49:22.436641 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3201fe3750: link becomes ready May 17 00:49:22.435314 systemd-networkd[1002]: calie3201fe3750: Gained carrier May 17 00:49:22.468389 env[1186]: time="2025-05-17T00:49:22.468319474Z" level=info msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:21.983 [INFO][3809] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.072 [INFO][3809] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0 calico-apiserver-6d846f879f- calico-apiserver 996c6d29-266c-48b3-a5d3-e06154625b48 981 0 2025-05-17 00:48:50 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d846f879f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 calico-apiserver-6d846f879f-7ch5r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie3201fe3750 [] [] }} ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.072 [INFO][3809] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.266 [INFO][3831] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" HandleID="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.272 [INFO][3831] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" HandleID="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-f656071047", "pod":"calico-apiserver-6d846f879f-7ch5r", "timestamp":"2025-05-17 00:49:22.266776887 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.273 [INFO][3831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.273 [INFO][3831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.273 [INFO][3831] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.285 [INFO][3831] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.298 [INFO][3831] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.311 [INFO][3831] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.330 [INFO][3831] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.345 [INFO][3831] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.345 [INFO][3831] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.350 [INFO][3831] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9 May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.362 [INFO][3831] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.386 [INFO][3831] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.6/26] block=192.168.111.0/26 handle="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.386 [INFO][3831] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.6/26] handle="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" host="ci-3510.3.7-n-f656071047" May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.386 [INFO][3831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:22.493632 env[1186]: 2025-05-17 00:49:22.386 [INFO][3831] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.6/26] IPv6=[] ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" HandleID="k8s-pod-network.b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.425 [INFO][3809] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"996c6d29-266c-48b3-a5d3-e06154625b48", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"calico-apiserver-6d846f879f-7ch5r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3201fe3750", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.426 [INFO][3809] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.6/32] ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.426 [INFO][3809] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie3201fe3750 ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.436 [INFO][3809] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.444 [INFO][3809] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"996c6d29-266c-48b3-a5d3-e06154625b48", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9", Pod:"calico-apiserver-6d846f879f-7ch5r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3201fe3750", MAC:"36:91:1b:8e:dc:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:22.496886 env[1186]: 2025-05-17 00:49:22.484 [INFO][3809] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9" Namespace="calico-apiserver" Pod="calico-apiserver-6d846f879f-7ch5r" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:22.594840 env[1186]: time="2025-05-17T00:49:22.594710250Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:22.595089 env[1186]: time="2025-05-17T00:49:22.594846400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:22.595089 env[1186]: time="2025-05-17T00:49:22.594883736Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:22.595216 env[1186]: time="2025-05-17T00:49:22.595140424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9 pid=3915 runtime=io.containerd.runc.v2 May 17 00:49:22.659062 systemd[1]: Started cri-containerd-b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9.scope. May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.675 [INFO][3897] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.675 [INFO][3897] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" iface="eth0" netns="/var/run/netns/cni-d72a2d23-fd10-8d9b-0fd5-a5c14587dbd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.676 [INFO][3897] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" iface="eth0" netns="/var/run/netns/cni-d72a2d23-fd10-8d9b-0fd5-a5c14587dbd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.676 [INFO][3897] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" iface="eth0" netns="/var/run/netns/cni-d72a2d23-fd10-8d9b-0fd5-a5c14587dbd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.676 [INFO][3897] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.676 [INFO][3897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.771 [INFO][3939] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.772 [INFO][3939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.773 [INFO][3939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.790 [WARNING][3939] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.790 [INFO][3939] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.793 [INFO][3939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:22.799304 env[1186]: 2025-05-17 00:49:22.796 [INFO][3897] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:22.800412 env[1186]: time="2025-05-17T00:49:22.800357331Z" level=info msg="TearDown network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" successfully" May 17 00:49:22.800583 env[1186]: time="2025-05-17T00:49:22.800562433Z" level=info msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" returns successfully" May 17 00:49:22.801168 kubelet[1950]: E0517 00:49:22.801122 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:22.802347 env[1186]: time="2025-05-17T00:49:22.802263966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-797cd,Uid:58e0b9ad-f250-4b99-a906-e77515643e8e,Namespace:kube-system,Attempt:1,}" May 17 00:49:22.855410 kubelet[1950]: E0517 00:49:22.855155 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:22.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.903000 audit: BPF prog-id=162 op=LOAD May 17 00:49:22.907000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.907000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3861 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363033386430386538383630363235666261383938306437633562 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3861 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363033386430386538383630363235666261383938306437633562 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.908000 audit: BPF prog-id=163 op=LOAD May 17 00:49:22.908000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028d080 items=0 ppid=3861 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363033386430386538383630363235666261383938306437633562 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.909000 audit: BPF prog-id=164 op=LOAD May 17 00:49:22.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028d0c8 items=0 ppid=3861 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363033386430386538383630363235666261383938306437633562 May 17 00:49:22.910000 audit: BPF prog-id=164 op=UNLOAD May 17 00:49:22.910000 audit: BPF prog-id=163 op=UNLOAD May 17 00:49:22.911000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.911000 audit: BPF prog-id=165 op=LOAD May 17 00:49:22.911000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d4d8 items=0 ppid=3861 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363033386430386538383630363235666261383938306437633562 May 17 00:49:22.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.947000 audit: BPF prog-id=166 op=LOAD May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3915 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353237313236623031303162363563323161396635336137333462 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3915 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353237313236623031303162363563323161396635336137333462 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit: BPF prog-id=167 op=LOAD May 17 00:49:22.949000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c9cd0 items=0 ppid=3915 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353237313236623031303162363563323161396635336137333462 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit: BPF prog-id=168 op=LOAD May 17 00:49:22.949000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c9d18 items=0 ppid=3915 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353237313236623031303162363563323161396635336137333462 May 17 00:49:22.949000 audit: BPF prog-id=168 op=UNLOAD May 17 00:49:22.949000 audit: BPF prog-id=167 op=UNLOAD May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:22.949000 audit: BPF prog-id=169 op=LOAD May 17 00:49:22.949000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035a128 items=0 ppid=3915 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353237313236623031303162363563323161396635336137333462 May 17 00:49:22.969359 systemd[1]: run-netns-cni\x2dd72a2d23\x2dfd10\x2d8d9b\x2d0fd5\x2da5c14587dbd1.mount: Deactivated successfully. May 17 00:49:23.198991 systemd-networkd[1002]: cali43f10179087: Link UP May 17 00:49:23.206480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:23.206697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43f10179087: link becomes ready May 17 00:49:23.207236 systemd-networkd[1002]: cali43f10179087: Gained carrier May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:22.899 [INFO][3946] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:22.967 [INFO][3946] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0 coredns-7c65d6cfc9- kube-system 58e0b9ad-f250-4b99-a906-e77515643e8e 997 0 2025-05-17 00:48:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 coredns-7c65d6cfc9-797cd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali43f10179087 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:22.967 [INFO][3946] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.091 [INFO][3966] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" HandleID="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.092 [INFO][3966] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" HandleID="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318510), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-f656071047", "pod":"coredns-7c65d6cfc9-797cd", "timestamp":"2025-05-17 00:49:23.089578956 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.092 [INFO][3966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.092 [INFO][3966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.092 [INFO][3966] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.107 [INFO][3966] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.125 [INFO][3966] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.138 [INFO][3966] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.143 [INFO][3966] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.150 [INFO][3966] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.150 [INFO][3966] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.159 [INFO][3966] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.168 [INFO][3966] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.186 [INFO][3966] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.7/26] block=192.168.111.0/26 handle="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.186 [INFO][3966] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.7/26] handle="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" host="ci-3510.3.7-n-f656071047" May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.186 [INFO][3966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:23.245630 env[1186]: 2025-05-17 00:49:23.186 [INFO][3966] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.7/26] IPv6=[] ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" HandleID="k8s-pod-network.8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.190 [INFO][3946] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"58e0b9ad-f250-4b99-a906-e77515643e8e", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"coredns-7c65d6cfc9-797cd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43f10179087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.191 [INFO][3946] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.7/32] ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.191 [INFO][3946] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali43f10179087 ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.208 [INFO][3946] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.210 [INFO][3946] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"58e0b9ad-f250-4b99-a906-e77515643e8e", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da", Pod:"coredns-7c65d6cfc9-797cd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43f10179087", MAC:"e6:8e:c9:c7:f2:82", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:23.246999 env[1186]: 2025-05-17 00:49:23.240 [INFO][3946] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da" Namespace="kube-system" Pod="coredns-7c65d6cfc9-797cd" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:23.283632 env[1186]: time="2025-05-17T00:49:23.280402711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:23.283632 env[1186]: time="2025-05-17T00:49:23.280559549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:23.283632 env[1186]: time="2025-05-17T00:49:23.280632516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:23.283632 env[1186]: time="2025-05-17T00:49:23.280961726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da pid=3988 runtime=io.containerd.runc.v2 May 17 00:49:23.358129 systemd[1]: Started cri-containerd-8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da.scope. May 17 00:49:23.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.393000 audit: BPF prog-id=170 op=LOAD May 17 00:49:23.396000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.396000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3988 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861366166303035653961633465616161386262396363333263313635 May 17 00:49:23.396000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.396000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3988 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861366166303035653961633465616161386262396363333263313635 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.398000 audit: BPF prog-id=171 op=LOAD May 17 00:49:23.398000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221180 items=0 ppid=3988 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861366166303035653961633465616161386262396363333263313635 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.399000 audit: BPF prog-id=172 op=LOAD May 17 00:49:23.399000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002211c8 items=0 ppid=3988 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861366166303035653961633465616161386262396363333263313635 May 17 00:49:23.402000 audit: BPF prog-id=172 op=UNLOAD May 17 00:49:23.402000 audit: BPF prog-id=171 op=UNLOAD May 17 00:49:23.402000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.402000 audit: BPF prog-id=173 op=LOAD May 17 00:49:23.402000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002215d8 items=0 ppid=3988 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861366166303035653961633465616161386262396363333263313635 May 17 00:49:23.417803 env[1186]: time="2025-05-17T00:49:23.417737035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-7ch5r,Uid:996c6d29-266c-48b3-a5d3-e06154625b48,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9\"" May 17 00:49:23.457770 env[1186]: time="2025-05-17T00:49:23.456553659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-797cd,Uid:58e0b9ad-f250-4b99-a906-e77515643e8e,Namespace:kube-system,Attempt:1,} returns sandbox id \"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da\"" May 17 00:49:23.462234 env[1186]: time="2025-05-17T00:49:23.462168429Z" level=info msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" May 17 00:49:23.485658 kubelet[1950]: E0517 00:49:23.484803 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:23.504504 env[1186]: time="2025-05-17T00:49:23.504393886Z" level=info msg="CreateContainer within sandbox \"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:49:23.611654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368031531.mount: Deactivated successfully. May 17 00:49:23.613157 env[1186]: time="2025-05-17T00:49:23.613106873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d846f879f-xdqfj,Uid:27c3d624-d977-468e-a5a3-c72cbb3b2e4d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f\"" May 17 00:49:23.627766 env[1186]: time="2025-05-17T00:49:23.627704864Z" level=info msg="CreateContainer within sandbox \"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d09cf8fc6e685b67925c60e7c7cd12de42dd821f67df897567a2eb722050867e\"" May 17 00:49:23.628974 env[1186]: time="2025-05-17T00:49:23.628912186Z" level=info msg="StartContainer for \"d09cf8fc6e685b67925c60e7c7cd12de42dd821f67df897567a2eb722050867e\"" May 17 00:49:23.671879 systemd-networkd[1002]: calie3201fe3750: Gained IPv6LL May 17 00:49:23.717788 systemd-networkd[1002]: cali60a659cd789: Gained IPv6LL May 17 00:49:23.743869 systemd[1]: Started cri-containerd-d09cf8fc6e685b67925c60e7c7cd12de42dd821f67df897567a2eb722050867e.scope. May 17 00:49:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.804000 audit: BPF prog-id=174 op=LOAD May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3988 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430396366386663366536383562363739323563363065376337636431 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3988 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430396366386663366536383562363739323563363065376337636431 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit: BPF prog-id=175 op=LOAD May 17 00:49:23.807000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000301ca0 items=0 ppid=3988 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430396366386663366536383562363739323563363065376337636431 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.807000 audit: BPF prog-id=176 op=LOAD May 17 00:49:23.807000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000301ce8 items=0 ppid=3988 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430396366386663366536383562363739323563363065376337636431 May 17 00:49:23.807000 audit: BPF prog-id=176 op=UNLOAD May 17 00:49:23.808000 audit: BPF prog-id=175 op=UNLOAD May 17 00:49:23.808000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.808000 audit: BPF prog-id=177 op=LOAD May 17 00:49:23.808000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003900f8 items=0 ppid=3988 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430396366386663366536383562363739323563363065376337636431 May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.730 [INFO][4045] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.732 [INFO][4045] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" iface="eth0" netns="/var/run/netns/cni-3b884ade-0971-9da4-cc9d-2d3d5c1d3ca1" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.734 [INFO][4045] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" iface="eth0" netns="/var/run/netns/cni-3b884ade-0971-9da4-cc9d-2d3d5c1d3ca1" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.734 [INFO][4045] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" iface="eth0" netns="/var/run/netns/cni-3b884ade-0971-9da4-cc9d-2d3d5c1d3ca1" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.735 [INFO][4045] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.735 [INFO][4045] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.812 [INFO][4088] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.818 [INFO][4088] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.819 [INFO][4088] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.844 [WARNING][4088] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.844 [INFO][4088] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.854 [INFO][4088] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:23.866193 env[1186]: 2025-05-17 00:49:23.858 [INFO][4045] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:23.870912 env[1186]: time="2025-05-17T00:49:23.866389927Z" level=info msg="TearDown network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" successfully" May 17 00:49:23.870912 env[1186]: time="2025-05-17T00:49:23.866432681Z" level=info msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" returns successfully" May 17 00:49:23.871151 env[1186]: time="2025-05-17T00:49:23.871080769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gkf98,Uid:bf62d9e0-554d-4665-aa65-a32531beade4,Namespace:calico-system,Attempt:1,}" May 17 00:49:23.878901 env[1186]: time="2025-05-17T00:49:23.878841925Z" level=info msg="StartContainer for \"d09cf8fc6e685b67925c60e7c7cd12de42dd821f67df897567a2eb722050867e\" returns successfully" May 17 00:49:23.962813 systemd[1]: run-netns-cni\x2d3b884ade\x2d0971\x2d9da4\x2dcc9d\x2d2d3d5c1d3ca1.mount: Deactivated successfully. May 17 00:49:24.027000 audit[4095]: AVC avc: denied { getattr } for pid=4095 comm="coredns" path="cgroup:[4026532818]" dev="nsfs" ino=4026532818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c763,c876 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:49:24.027000 audit[4095]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4fa8 a3=0 items=0 ppid=3988 pid=4095 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c763,c876 key=(null) May 17 00:49:24.027000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:49:24.276763 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:24.276914 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibcd401ecc93: link becomes ready May 17 00:49:24.277718 systemd-networkd[1002]: calibcd401ecc93: Link UP May 17 00:49:24.277985 systemd-networkd[1002]: calibcd401ecc93: Gained carrier May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:23.985 [INFO][4112] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.034 [INFO][4112] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0 csi-node-driver- calico-system bf62d9e0-554d-4665-aa65-a32531beade4 1015 0 2025-05-17 00:48:55 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-f656071047 csi-node-driver-gkf98 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calibcd401ecc93 [] [] }} ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.034 [INFO][4112] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.173 [INFO][4125] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" HandleID="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.174 [INFO][4125] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" HandleID="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000280600), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f656071047", "pod":"csi-node-driver-gkf98", "timestamp":"2025-05-17 00:49:24.173903903 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f656071047", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.174 [INFO][4125] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.174 [INFO][4125] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.174 [INFO][4125] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f656071047' May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.187 [INFO][4125] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.208 [INFO][4125] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.216 [INFO][4125] ipam/ipam.go 511: Trying affinity for 192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.219 [INFO][4125] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.230 [INFO][4125] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.0/26 host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.230 [INFO][4125] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.0/26 handle="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.241 [INFO][4125] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.251 [INFO][4125] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.0/26 handle="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.265 [INFO][4125] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.8/26] block=192.168.111.0/26 handle="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.265 [INFO][4125] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.8/26] handle="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" host="ci-3510.3.7-n-f656071047" May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.265 [INFO][4125] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:24.309419 env[1186]: 2025-05-17 00:49:24.265 [INFO][4125] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.8/26] IPv6=[] ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" HandleID="k8s-pod-network.8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.268 [INFO][4112] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bf62d9e0-554d-4665-aa65-a32531beade4", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"", Pod:"csi-node-driver-gkf98", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibcd401ecc93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.268 [INFO][4112] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.8/32] ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.269 [INFO][4112] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibcd401ecc93 ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.276 [INFO][4112] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.277 [INFO][4112] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bf62d9e0-554d-4665-aa65-a32531beade4", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab", Pod:"csi-node-driver-gkf98", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibcd401ecc93", MAC:"6a:2e:ff:08:37:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:24.310886 env[1186]: 2025-05-17 00:49:24.292 [INFO][4112] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab" Namespace="calico-system" Pod="csi-node-driver-gkf98" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:24.355026 env[1186]: time="2025-05-17T00:49:24.354898393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:24.355220 env[1186]: time="2025-05-17T00:49:24.355061753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:24.355220 env[1186]: time="2025-05-17T00:49:24.355092988Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:24.355328 env[1186]: time="2025-05-17T00:49:24.355299010Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab pid=4152 runtime=io.containerd.runc.v2 May 17 00:49:24.399689 systemd[1]: Started cri-containerd-8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab.scope. May 17 00:49:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.478000 audit: BPF prog-id=178 op=LOAD May 17 00:49:24.479000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.479000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4152 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864613338393532376233343430626537306463386634313631623635 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4152 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864613338393532376233343430626537306463386634313631623635 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.480000 audit: BPF prog-id=179 op=LOAD May 17 00:49:24.480000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185160 items=0 ppid=4152 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864613338393532376233343430626537306463386634313631623635 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.483000 audit: BPF prog-id=180 op=LOAD May 17 00:49:24.483000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001851a8 items=0 ppid=4152 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864613338393532376233343430626537306463386634313631623635 May 17 00:49:24.484000 audit: BPF prog-id=180 op=UNLOAD May 17 00:49:24.484000 audit: BPF prog-id=179 op=UNLOAD May 17 00:49:24.485000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:24.485000 audit: BPF prog-id=181 op=LOAD May 17 00:49:24.485000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001855b8 items=0 ppid=4152 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864613338393532376233343430626537306463386634313631623635 May 17 00:49:24.545739 env[1186]: time="2025-05-17T00:49:24.545670969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gkf98,Uid:bf62d9e0-554d-4665-aa65-a32531beade4,Namespace:calico-system,Attempt:1,} returns sandbox id \"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab\"" May 17 00:49:24.589979 kubelet[1950]: I0517 00:49:24.589858 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:24.591184 kubelet[1950]: E0517 00:49:24.591153 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:24.709000 audit[4198]: NETFILTER_CFG table=filter:107 family=2 entries=15 op=nft_register_rule pid=4198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:24.709000 audit[4198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffef20a8540 a2=0 a3=7ffef20a852c items=0 ppid=2068 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:24.716000 audit[4198]: NETFILTER_CFG table=nat:108 family=2 entries=25 op=nft_register_chain pid=4198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:24.716000 audit[4198]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffef20a8540 a2=0 a3=7ffef20a852c items=0 ppid=2068 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:24.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:24.891017 kubelet[1950]: E0517 00:49:24.886879 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:24.933436 kubelet[1950]: E0517 00:49:24.933393 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:24.983559 kubelet[1950]: I0517 00:49:24.983470 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-797cd" podStartSLOduration=48.983437356 podStartE2EDuration="48.983437356s" podCreationTimestamp="2025-05-17 00:48:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:24.953359343 +0000 UTC m=+52.794332626" watchObservedRunningTime="2025-05-17 00:49:24.983437356 +0000 UTC m=+52.824410642" May 17 00:49:25.060805 systemd-networkd[1002]: cali43f10179087: Gained IPv6LL May 17 00:49:25.059000 audit[4201]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:25.059000 audit[4201]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff83c8a780 a2=0 a3=7fff83c8a76c items=0 ppid=2068 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:25.077000 audit[4201]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:25.077000 audit[4201]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff83c8a780 a2=0 a3=7fff83c8a76c items=0 ppid=2068 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:25.380855 systemd-networkd[1002]: calibcd401ecc93: Gained IPv6LL May 17 00:49:25.791546 env[1186]: time="2025-05-17T00:49:25.791385192Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:25.793734 env[1186]: time="2025-05-17T00:49:25.793680703Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:25.796133 env[1186]: time="2025-05-17T00:49:25.796073952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:25.797864 env[1186]: time="2025-05-17T00:49:25.797810358Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:25.799256 env[1186]: time="2025-05-17T00:49:25.799175651Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:49:25.801365 env[1186]: time="2025-05-17T00:49:25.801314405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:49:25.834723 env[1186]: time="2025-05-17T00:49:25.834663278Z" level=info msg="CreateContainer within sandbox \"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:49:25.853143 env[1186]: time="2025-05-17T00:49:25.853059859Z" level=info msg="CreateContainer within sandbox \"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2\"" May 17 00:49:25.857787 env[1186]: time="2025-05-17T00:49:25.857729921Z" level=info msg="StartContainer for \"b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2\"" May 17 00:49:25.906804 systemd[1]: Started cri-containerd-b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2.scope. May 17 00:49:25.950061 kernel: kauditd_printk_skb: 482 callbacks suppressed May 17 00:49:25.950336 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.950403 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.950439 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.956471 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960632 kubelet[1950]: E0517 00:49:25.959917 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:25.938000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.969946 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.970138 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.975833 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.979701 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.938000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984428 kernel: audit: type=1400 audit(1747442965.938:1235): avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984574 kernel: audit: type=1334 audit(1747442965.938:1235): prog-id=182 op=LOAD May 17 00:49:25.938000 audit: BPF prog-id=182 op=LOAD May 17 00:49:25.938000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4601a5c0 a2=98 a3=3 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.938000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:25.949000 audit: BPF prog-id=182 op=UNLOAD May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit: BPF prog-id=183 op=LOAD May 17 00:49:25.954000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4601a3b0 a2=94 a3=54428f items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:25.954000 audit: BPF prog-id=183 op=UNLOAD May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.954000 audit: BPF prog-id=184 op=LOAD May 17 00:49:25.954000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4601a3e0 a2=94 a3=2 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:25.954000 audit: BPF prog-id=184 op=UNLOAD May 17 00:49:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.963000 audit: BPF prog-id=185 op=LOAD May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3606 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653063396366363338326235313931643039626265343439636133 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3606 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653063396366363338326235313931643039626265343439636133 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.965000 audit: BPF prog-id=186 op=LOAD May 17 00:49:25.965000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000243a0 items=0 ppid=3606 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653063396366363338326235313931643039626265343439636133 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.984000 audit: BPF prog-id=187 op=LOAD May 17 00:49:25.984000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243e8 items=0 ppid=3606 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653063396366363338326235313931643039626265343439636133 May 17 00:49:25.984000 audit: BPF prog-id=187 op=UNLOAD May 17 00:49:25.985000 audit: BPF prog-id=186 op=UNLOAD May 17 00:49:25.985000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:25.985000 audit: BPF prog-id=188 op=LOAD May 17 00:49:25.985000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247f8 items=0 ppid=3606 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:25.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653063396366363338326235313931643039626265343439636133 May 17 00:49:26.040006 env[1186]: time="2025-05-17T00:49:26.039933649Z" level=info msg="StartContainer for \"b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2\" returns successfully" May 17 00:49:26.097000 audit[4288]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:26.097000 audit[4288]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff9c2768f0 a2=0 a3=7fff9c2768dc items=0 ppid=2068 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:26.127000 audit[4288]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:26.127000 audit[4288]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff9c2768f0 a2=0 a3=7fff9c2768dc items=0 ppid=2068 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit: BPF prog-id=189 op=LOAD May 17 00:49:26.205000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4601a2a0 a2=94 a3=1 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.205000 audit: BPF prog-id=189 op=UNLOAD May 17 00:49:26.205000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.205000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc4601a370 a2=50 a3=7ffc4601a450 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.239000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.239000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a2b0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.240000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.240000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4601a2e0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4601a1f0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a300 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a2e0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a2d0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a300 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4601a2e0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4601a300 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4601a2d0 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4601a340 a2=28 a3=0 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc4601a0f0 a2=50 a3=1 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit: BPF prog-id=190 op=LOAD May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc4601a0f0 a2=94 a3=5 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit: BPF prog-id=190 op=UNLOAD May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc4601a1a0 a2=50 a3=1 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc4601a2c0 a2=4 a3=38 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.241000 audit[4268]: AVC avc: denied { confidentiality } for pid=4268 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.241000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc4601a310 a2=94 a3=6 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { confidentiality } for pid=4268 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.244000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc46019ac0 a2=94 a3=88 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.244000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.244000 audit[4268]: AVC avc: denied { confidentiality } for pid=4268 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.244000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc46019ac0 a2=94 a3=88 items=0 ppid=4223 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.244000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:49:26.309000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.309000 audit: BPF prog-id=191 op=LOAD May 17 00:49:26.309000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6daf32b0 a2=98 a3=1999999999999999 items=0 ppid=4223 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.309000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:49:26.311000 audit: BPF prog-id=191 op=UNLOAD May 17 00:49:26.311000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.311000 audit: BPF prog-id=192 op=LOAD May 17 00:49:26.311000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6daf3190 a2=94 a3=ffff items=0 ppid=4223 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.311000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:49:26.312000 audit: BPF prog-id=192 op=UNLOAD May 17 00:49:26.313000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.313000 audit: BPF prog-id=193 op=LOAD May 17 00:49:26.313000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6daf31d0 a2=94 a3=7fff6daf33b0 items=0 ppid=4223 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.313000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:49:26.314000 audit: BPF prog-id=193 op=UNLOAD May 17 00:49:26.443512 systemd-networkd[1002]: vxlan.calico: Link UP May 17 00:49:26.443524 systemd-networkd[1002]: vxlan.calico: Gained carrier May 17 00:49:26.507000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.507000 audit: BPF prog-id=194 op=LOAD May 17 00:49:26.507000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4e8347d0 a2=98 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.507000 audit: BPF prog-id=194 op=UNLOAD May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit: BPF prog-id=195 op=LOAD May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4e8345e0 a2=94 a3=54428f items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit: BPF prog-id=195 op=UNLOAD May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit: BPF prog-id=196 op=LOAD May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4e834610 a2=94 a3=2 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit: BPF prog-id=196 op=UNLOAD May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e8344e0 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4e834510 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4e834420 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e834530 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e834510 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e834500 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e834530 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4e834510 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4e834530 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4e834500 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4e834570 a2=28 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.508000 audit: BPF prog-id=197 op=LOAD May 17 00:49:26.508000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4e8343e0 a2=94 a3=0 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.508000 audit: BPF prog-id=197 op=UNLOAD May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff4e8343d0 a2=50 a3=2800 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff4e8343d0 a2=50 a3=2800 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit: BPF prog-id=198 op=LOAD May 17 00:49:26.509000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4e833bf0 a2=94 a3=2 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.509000 audit: BPF prog-id=198 op=UNLOAD May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.509000 audit: BPF prog-id=199 op=LOAD May 17 00:49:26.509000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4e833cf0 a2=94 a3=30 items=0 ppid=4223 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.521000 audit: BPF prog-id=200 op=LOAD May 17 00:49:26.521000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff955a4100 a2=98 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.521000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.521000 audit: BPF prog-id=200 op=UNLOAD May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit: BPF prog-id=201 op=LOAD May 17 00:49:26.522000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff955a3ef0 a2=94 a3=54428f items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.522000 audit: BPF prog-id=201 op=UNLOAD May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.522000 audit: BPF prog-id=202 op=LOAD May 17 00:49:26.522000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff955a3f20 a2=94 a3=2 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.530000 audit: BPF prog-id=202 op=UNLOAD May 17 00:49:26.737000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.737000 audit: BPF prog-id=203 op=LOAD May 17 00:49:26.737000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff955a3de0 a2=94 a3=1 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.739000 audit: BPF prog-id=203 op=UNLOAD May 17 00:49:26.739000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.739000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff955a3eb0 a2=50 a3=7fff955a3f90 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.756000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.756000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3df0 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.757000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.757000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff955a3e20 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.757000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.757000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff955a3d30 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.757000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.757000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3e40 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.758000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.758000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3e20 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.758000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.758000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3e10 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.758000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.758000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3e40 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.758000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.758000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff955a3e20 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.759000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.759000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff955a3e40 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.759000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.759000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff955a3e10 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.759000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.759000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff955a3e80 a2=28 a3=0 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff955a3c30 a2=50 a3=1 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.760000 audit: BPF prog-id=204 op=LOAD May 17 00:49:26.760000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff955a3c30 a2=94 a3=5 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.761000 audit: BPF prog-id=204 op=UNLOAD May 17 00:49:26.761000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.761000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff955a3ce0 a2=50 a3=1 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff955a3e00 a2=4 a3=38 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.762000 audit[4324]: AVC avc: denied { confidentiality } for pid=4324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.762000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff955a3e50 a2=94 a3=6 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.763000 audit[4324]: AVC avc: denied { confidentiality } for pid=4324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.763000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff955a3600 a2=94 a3=88 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.765000 audit[4324]: AVC avc: denied { confidentiality } for pid=4324 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:49:26.765000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff955a3600 a2=94 a3=88 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.766000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.766000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff955a5030 a2=10 a3=f8f00800 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.766000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.767000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.767000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff955a4ed0 a2=10 a3=3 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.767000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.767000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.767000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff955a4e70 a2=10 a3=3 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.767000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.768000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:26.768000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff955a4e70 a2=10 a3=7 items=0 ppid=4223 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:49:26.776000 audit: BPF prog-id=199 op=UNLOAD May 17 00:49:26.776000 audit[4330]: SYSCALL arch=c000003e syscall=10 success=yes exit=0 a0=7f1893b2f000 a1=1000 a2=1 a3=55e00c0165c0 items=0 ppid=3203 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="run" exe="/usr/bin/bash" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.776000 audit: PROCTITLE proctitle=2F62696E2F7368002E2F72756E May 17 00:49:26.817962 systemd[1]: run-containerd-runc-k8s.io-b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2-runc.WfJYz5.mount: Deactivated successfully. May 17 00:49:26.942000 audit[4358]: NETFILTER_CFG table=raw:113 family=2 entries=21 op=nft_register_chain pid=4358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:26.942000 audit[4358]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdc8585960 a2=0 a3=7ffdc858594c items=0 ppid=4223 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.942000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:26.962000 audit[4361]: NETFILTER_CFG table=mangle:114 family=2 entries=16 op=nft_register_chain pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:26.962000 audit[4361]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe11f6d0c0 a2=0 a3=7ffe11f6d0ac items=0 ppid=4223 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.962000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:26.973000 audit[4359]: NETFILTER_CFG table=nat:115 family=2 entries=15 op=nft_register_chain pid=4359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:26.973000 audit[4359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd9720d680 a2=0 a3=7ffd9720d66c items=0 ppid=4223 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:26.976898 kubelet[1950]: E0517 00:49:26.975959 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:27.039285 systemd[1]: run-containerd-runc-k8s.io-b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2-runc.jS8q8q.mount: Deactivated successfully. May 17 00:49:27.014000 audit[4364]: NETFILTER_CFG table=filter:116 family=2 entries=315 op=nft_register_chain pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:27.014000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=187764 a0=3 a1=7fffd7882cf0 a2=0 a3=7fffd7882cdc items=0 ppid=4223 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:27.014000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:27.138000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.138000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028e4f60 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:27.138000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:27.139000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.139000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016c5c20 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:27.139000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:27.141051 kubelet[1950]: I0517 00:49:27.138289 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-86d6858c89-btznn" podStartSLOduration=26.877554945 podStartE2EDuration="32.138252411s" podCreationTimestamp="2025-05-17 00:48:55 +0000 UTC" firstStartedPulling="2025-05-17 00:49:20.539875562 +0000 UTC m=+48.380848850" lastFinishedPulling="2025-05-17 00:49:25.800573039 +0000 UTC m=+53.641546316" observedRunningTime="2025-05-17 00:49:27.005828382 +0000 UTC m=+54.846801666" watchObservedRunningTime="2025-05-17 00:49:27.138252411 +0000 UTC m=+54.979225695" May 17 00:49:27.812859 systemd-networkd[1002]: vxlan.calico: Gained IPv6LL May 17 00:49:27.866000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.866000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.866000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012c955a0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:27.866000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011456e40 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:27.868000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.868000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c012cc9710 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:27.900000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.900000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011596540 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.900000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:27.918000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.918000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0115920a0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:27.919000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:27.919000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011457b00 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:49:27.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:49:29.485880 env[1186]: time="2025-05-17T00:49:29.485796661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.489886 env[1186]: time="2025-05-17T00:49:29.488973860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.493985 env[1186]: time="2025-05-17T00:49:29.493907414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.497436 env[1186]: time="2025-05-17T00:49:29.497344978Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.499055 env[1186]: time="2025-05-17T00:49:29.498989202Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:49:29.503537 env[1186]: time="2025-05-17T00:49:29.502534660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:49:29.507218 env[1186]: time="2025-05-17T00:49:29.507158374Z" level=info msg="CreateContainer within sandbox \"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:49:29.531013 env[1186]: time="2025-05-17T00:49:29.526214115Z" level=info msg="CreateContainer within sandbox \"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d1ce3f73c0cb81e46f18c34e5da96cb1a4903b37d2e78c385241b5022201cb3b\"" May 17 00:49:29.533705 env[1186]: time="2025-05-17T00:49:29.533660603Z" level=info msg="StartContainer for \"d1ce3f73c0cb81e46f18c34e5da96cb1a4903b37d2e78c385241b5022201cb3b\"" May 17 00:49:29.614446 systemd[1]: run-containerd-runc-k8s.io-d1ce3f73c0cb81e46f18c34e5da96cb1a4903b37d2e78c385241b5022201cb3b-runc.80JIdb.mount: Deactivated successfully. May 17 00:49:29.619202 systemd[1]: Started cri-containerd-d1ce3f73c0cb81e46f18c34e5da96cb1a4903b37d2e78c385241b5022201cb3b.scope. May 17 00:49:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.639000 audit: BPF prog-id=205 op=LOAD May 17 00:49:29.640000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.640000 audit[4400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3915 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:29.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636533663733633063623831653436663138633334653564613936 May 17 00:49:29.641000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.641000 audit[4400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3915 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:29.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636533663733633063623831653436663138633334653564613936 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.642000 audit: BPF prog-id=206 op=LOAD May 17 00:49:29.642000 audit[4400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0430 items=0 ppid=3915 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:29.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636533663733633063623831653436663138633334653564613936 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.643000 audit: BPF prog-id=207 op=LOAD May 17 00:49:29.643000 audit[4400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0478 items=0 ppid=3915 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:29.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636533663733633063623831653436663138633334653564613936 May 17 00:49:29.644000 audit: BPF prog-id=207 op=UNLOAD May 17 00:49:29.644000 audit: BPF prog-id=206 op=UNLOAD May 17 00:49:29.644000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:29.644000 audit: BPF prog-id=208 op=LOAD May 17 00:49:29.644000 audit[4400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0888 items=0 ppid=3915 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:29.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636533663733633063623831653436663138633334653564613936 May 17 00:49:29.699693 env[1186]: time="2025-05-17T00:49:29.699561086Z" level=info msg="StartContainer for \"d1ce3f73c0cb81e46f18c34e5da96cb1a4903b37d2e78c385241b5022201cb3b\" returns successfully" May 17 00:49:29.881390 env[1186]: time="2025-05-17T00:49:29.881319205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.883073 env[1186]: time="2025-05-17T00:49:29.883027320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.885101 env[1186]: time="2025-05-17T00:49:29.885048232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.886903 env[1186]: time="2025-05-17T00:49:29.886850566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:29.888036 env[1186]: time="2025-05-17T00:49:29.887983820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:49:29.891187 env[1186]: time="2025-05-17T00:49:29.890847809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:49:29.892998 env[1186]: time="2025-05-17T00:49:29.892825535Z" level=info msg="CreateContainer within sandbox \"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:49:29.928537 env[1186]: time="2025-05-17T00:49:29.928456227Z" level=info msg="CreateContainer within sandbox \"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8f9c367d3e25a357f9865934551136cd3525af60b480cf89140b83a44591a08e\"" May 17 00:49:29.929899 env[1186]: time="2025-05-17T00:49:29.929850868Z" level=info msg="StartContainer for \"8f9c367d3e25a357f9865934551136cd3525af60b480cf89140b83a44591a08e\"" May 17 00:49:29.964755 systemd[1]: Started cri-containerd-8f9c367d3e25a357f9865934551136cd3525af60b480cf89140b83a44591a08e.scope. May 17 00:49:30.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.009000 audit: BPF prog-id=209 op=LOAD May 17 00:49:30.011000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.011000 audit[4440]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3861 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396333363764336532356133353766393836353933343535313133 May 17 00:49:30.011000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.011000 audit[4440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3861 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396333363764336532356133353766393836353933343535313133 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.012000 audit: BPF prog-id=210 op=LOAD May 17 00:49:30.012000 audit[4440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002198d0 items=0 ppid=3861 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396333363764336532356133353766393836353933343535313133 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.014000 audit: BPF prog-id=211 op=LOAD May 17 00:49:30.014000 audit[4440]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219918 items=0 ppid=3861 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396333363764336532356133353766393836353933343535313133 May 17 00:49:30.016000 audit: BPF prog-id=211 op=UNLOAD May 17 00:49:30.016000 audit: BPF prog-id=210 op=UNLOAD May 17 00:49:30.016000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:30.016000 audit: BPF prog-id=212 op=LOAD May 17 00:49:30.016000 audit[4440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219d28 items=0 ppid=3861 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396333363764336532356133353766393836353933343535313133 May 17 00:49:30.096510 env[1186]: time="2025-05-17T00:49:30.096429079Z" level=info msg="StartContainer for \"8f9c367d3e25a357f9865934551136cd3525af60b480cf89140b83a44591a08e\" returns successfully" May 17 00:49:30.125000 audit[4465]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:30.125000 audit[4465]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc0ff0a7d0 a2=0 a3=7ffc0ff0a7bc items=0 ppid=2068 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:30.131000 audit[4465]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:30.131000 audit[4465]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc0ff0a7d0 a2=0 a3=7ffc0ff0a7bc items=0 ppid=2068 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:30.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:31.009822 kubelet[1950]: I0517 00:49:31.009773 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:31.049250 kubelet[1950]: I0517 00:49:31.049175 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d846f879f-7ch5r" podStartSLOduration=34.969595815 podStartE2EDuration="41.049140516s" podCreationTimestamp="2025-05-17 00:48:50 +0000 UTC" firstStartedPulling="2025-05-17 00:49:23.421417228 +0000 UTC m=+51.262390503" lastFinishedPulling="2025-05-17 00:49:29.500961929 +0000 UTC m=+57.341935204" observedRunningTime="2025-05-17 00:49:30.040100912 +0000 UTC m=+57.881074197" watchObservedRunningTime="2025-05-17 00:49:31.049140516 +0000 UTC m=+58.890113803" May 17 00:49:31.049967 kubelet[1950]: I0517 00:49:31.049896 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d846f879f-xdqfj" podStartSLOduration=34.780382955 podStartE2EDuration="41.04987634s" podCreationTimestamp="2025-05-17 00:48:50 +0000 UTC" firstStartedPulling="2025-05-17 00:49:23.620758933 +0000 UTC m=+51.461732215" lastFinishedPulling="2025-05-17 00:49:29.890252319 +0000 UTC m=+57.731225600" observedRunningTime="2025-05-17 00:49:31.047245876 +0000 UTC m=+58.888219151" watchObservedRunningTime="2025-05-17 00:49:31.04987634 +0000 UTC m=+58.890849616" May 17 00:49:31.119353 kernel: kauditd_printk_skb: 691 callbacks suppressed May 17 00:49:31.119669 kernel: audit: type=1325 audit(1747442971.115:1396): table=filter:119 family=2 entries=14 op=nft_register_rule pid=4477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:31.115000 audit[4477]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:31.115000 audit[4477]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffddb512620 a2=0 a3=7ffddb51260c items=0 ppid=2068 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.129636 kernel: audit: type=1300 audit(1747442971.115:1396): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffddb512620 a2=0 a3=7ffddb51260c items=0 ppid=2068 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:31.132616 kernel: audit: type=1327 audit(1747442971.115:1396): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:31.137000 audit[4477]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:31.141630 kernel: audit: type=1325 audit(1747442971.137:1397): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:31.137000 audit[4477]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffddb512620 a2=0 a3=7ffddb51260c items=0 ppid=2068 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.147638 kernel: audit: type=1300 audit(1747442971.137:1397): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffddb512620 a2=0 a3=7ffddb51260c items=0 ppid=2068 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.150718 kernel: audit: type=1327 audit(1747442971.137:1397): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:31.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:31.476354 env[1186]: time="2025-05-17T00:49:31.476274071Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.478738 env[1186]: time="2025-05-17T00:49:31.478670604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.486051 env[1186]: time="2025-05-17T00:49:31.485962125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.487975 env[1186]: time="2025-05-17T00:49:31.487910507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.489805 env[1186]: time="2025-05-17T00:49:31.489568329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:49:31.527485 env[1186]: time="2025-05-17T00:49:31.527409953Z" level=info msg="CreateContainer within sandbox \"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:49:31.552929 env[1186]: time="2025-05-17T00:49:31.552852971Z" level=info msg="CreateContainer within sandbox \"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cd733992d1189d01620f78290c52d7efa894c7496782c41d7bd1102fb6859f20\"" May 17 00:49:31.554050 env[1186]: time="2025-05-17T00:49:31.554004990Z" level=info msg="StartContainer for \"cd733992d1189d01620f78290c52d7efa894c7496782c41d7bd1102fb6859f20\"" May 17 00:49:31.623399 systemd[1]: run-containerd-runc-k8s.io-cd733992d1189d01620f78290c52d7efa894c7496782c41d7bd1102fb6859f20-runc.bmbdgc.mount: Deactivated successfully. May 17 00:49:31.638186 systemd[1]: Started cri-containerd-cd733992d1189d01620f78290c52d7efa894c7496782c41d7bd1102fb6859f20.scope. May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.677669 kernel: audit: type=1400 audit(1747442971.673:1398): avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fef168cafe8 items=0 ppid=4152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.683740 kernel: audit: type=1300 audit(1747442971.673:1398): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fef168cafe8 items=0 ppid=4152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.683964 kernel: audit: type=1327 audit(1747442971.673:1398): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373333393932643131383964303136323066373832393063353264 May 17 00:49:31.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373333393932643131383964303136323066373832393063353264 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.695620 kernel: audit: type=1400 audit(1747442971.673:1399): avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit: BPF prog-id=213 op=LOAD May 17 00:49:31.673000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d48d8 items=0 ppid=4152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373333393932643131383964303136323066373832393063353264 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit: BPF prog-id=214 op=LOAD May 17 00:49:31.673000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d4928 items=0 ppid=4152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373333393932643131383964303136323066373832393063353264 May 17 00:49:31.673000 audit: BPF prog-id=214 op=UNLOAD May 17 00:49:31.673000 audit: BPF prog-id=213 op=UNLOAD May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:31.673000 audit: BPF prog-id=215 op=LOAD May 17 00:49:31.673000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d49b8 items=0 ppid=4152 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:31.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373333393932643131383964303136323066373832393063353264 May 17 00:49:31.724119 env[1186]: time="2025-05-17T00:49:31.724065279Z" level=info msg="StartContainer for \"cd733992d1189d01620f78290c52d7efa894c7496782c41d7bd1102fb6859f20\" returns successfully" May 17 00:49:31.726581 env[1186]: time="2025-05-17T00:49:31.726459424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:49:32.025303 kubelet[1950]: I0517 00:49:32.025115 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:32.491000 audit[4450]: AVC avc: denied { watch } for pid=4450 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_06.3068264033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c522,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c522,c842 tclass=file permissive=0 May 17 00:49:32.491000 audit[4450]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000345ce0 a2=fc6 a3=0 items=0 ppid=3861 pid=4450 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c522,c842 key=(null) May 17 00:49:32.491000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:32.516776 env[1186]: time="2025-05-17T00:49:32.516260331Z" level=info msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.703 [WARNING][4531] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"3461bd46-ccb4-49ae-adb8-d3251ec9543b", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8", Pod:"coredns-7c65d6cfc9-ddxgk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2c9f757e53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.705 [INFO][4531] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.705 [INFO][4531] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" iface="eth0" netns="" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.705 [INFO][4531] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.705 [INFO][4531] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.898 [INFO][4539] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.902 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.903 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.950 [WARNING][4539] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.950 [INFO][4539] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.954 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:32.961147 env[1186]: 2025-05-17 00:49:32.957 [INFO][4531] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:32.962122 env[1186]: time="2025-05-17T00:49:32.962062362Z" level=info msg="TearDown network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" successfully" May 17 00:49:32.962279 env[1186]: time="2025-05-17T00:49:32.962251294Z" level=info msg="StopPodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" returns successfully" May 17 00:49:32.994350 env[1186]: time="2025-05-17T00:49:32.994285377Z" level=info msg="RemovePodSandbox for \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" May 17 00:49:32.994640 env[1186]: time="2025-05-17T00:49:32.994569893Z" level=info msg="Forcibly stopping sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\"" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.118 [WARNING][4554] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"3461bd46-ccb4-49ae-adb8-d3251ec9543b", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"da662291308f80a88bcec2509060ad15e38d3fd317c373ecdfe64eb3028673f8", Pod:"coredns-7c65d6cfc9-ddxgk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2c9f757e53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.118 [INFO][4554] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.118 [INFO][4554] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" iface="eth0" netns="" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.118 [INFO][4554] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.118 [INFO][4554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.241 [INFO][4561] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.241 [INFO][4561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.241 [INFO][4561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.267 [WARNING][4561] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.267 [INFO][4561] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" HandleID="k8s-pod-network.57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--ddxgk-eth0" May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.271 [INFO][4561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:33.277866 env[1186]: 2025-05-17 00:49:33.274 [INFO][4554] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6" May 17 00:49:33.279471 env[1186]: time="2025-05-17T00:49:33.277827133Z" level=info msg="TearDown network for sandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" successfully" May 17 00:49:33.283835 env[1186]: time="2025-05-17T00:49:33.283770288Z" level=info msg="RemovePodSandbox \"57dd1284c16e908b45a02898f3df0ff65d579e0d052b0e0f2e7e8ef120205ad6\" returns successfully" May 17 00:49:33.284751 env[1186]: time="2025-05-17T00:49:33.284713462Z" level=info msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.406 [WARNING][4577] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.407 [INFO][4577] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.407 [INFO][4577] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" iface="eth0" netns="" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.407 [INFO][4577] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.407 [INFO][4577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.473 [INFO][4584] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.474 [INFO][4584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.474 [INFO][4584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.485 [WARNING][4584] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.485 [INFO][4584] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.492 [INFO][4584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:33.498838 env[1186]: 2025-05-17 00:49:33.496 [INFO][4577] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.499976 env[1186]: time="2025-05-17T00:49:33.499913120Z" level=info msg="TearDown network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" successfully" May 17 00:49:33.500295 env[1186]: time="2025-05-17T00:49:33.500263552Z" level=info msg="StopPodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" returns successfully" May 17 00:49:33.501733 env[1186]: time="2025-05-17T00:49:33.501692245Z" level=info msg="RemovePodSandbox for \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" May 17 00:49:33.501955 env[1186]: time="2025-05-17T00:49:33.501902602Z" level=info msg="Forcibly stopping sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\"" May 17 00:49:33.544000 audit[4410]: AVC avc: denied { watch } for pid=4410 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_06.481463891/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c823 tclass=file permissive=0 May 17 00:49:33.544000 audit[4410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005e8ba0 a2=fc6 a3=0 items=0 ppid=3915 pid=4410 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 key=(null) May 17 00:49:33.544000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.620 [WARNING][4599] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" WorkloadEndpoint="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.620 [INFO][4599] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.620 [INFO][4599] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" iface="eth0" netns="" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.620 [INFO][4599] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.620 [INFO][4599] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.704 [INFO][4606] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.704 [INFO][4606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.704 [INFO][4606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.723 [WARNING][4606] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.723 [INFO][4606] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" HandleID="k8s-pod-network.184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" Workload="ci--3510.3.7--n--f656071047-k8s-whisker--b97559666--s7gpw-eth0" May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.726 [INFO][4606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:33.743195 env[1186]: 2025-05-17 00:49:33.734 [INFO][4599] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b" May 17 00:49:33.745159 env[1186]: time="2025-05-17T00:49:33.744083216Z" level=info msg="TearDown network for sandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" successfully" May 17 00:49:33.749277 env[1186]: time="2025-05-17T00:49:33.749214975Z" level=info msg="RemovePodSandbox \"184c9b851909fb23a9a25fd63479ed7645b760362da4fc768223bc8e1282f36b\" returns successfully" May 17 00:49:33.753433 env[1186]: time="2025-05-17T00:49:33.753385643Z" level=info msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" May 17 00:49:33.768294 env[1186]: time="2025-05-17T00:49:33.768230988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:33.771140 env[1186]: time="2025-05-17T00:49:33.771081620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:33.774521 env[1186]: time="2025-05-17T00:49:33.774464030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:33.777303 env[1186]: time="2025-05-17T00:49:33.777241873Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:49:33.777641 env[1186]: time="2025-05-17T00:49:33.776707496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:33.781745 env[1186]: time="2025-05-17T00:49:33.780953827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:33.784987 env[1186]: time="2025-05-17T00:49:33.784936146Z" level=info msg="CreateContainer within sandbox \"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:49:33.801004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1522308401.mount: Deactivated successfully. May 17 00:49:33.806105 env[1186]: time="2025-05-17T00:49:33.806042776Z" level=info msg="CreateContainer within sandbox \"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9f508427742e8d9d0e79d27caa84cbe57912e0dfd2fadf3dfb50ca534e9b5d19\"" May 17 00:49:33.808809 env[1186]: time="2025-05-17T00:49:33.807808013Z" level=info msg="StartContainer for \"9f508427742e8d9d0e79d27caa84cbe57912e0dfd2fadf3dfb50ca534e9b5d19\"" May 17 00:49:33.878943 systemd[1]: Started cri-containerd-9f508427742e8d9d0e79d27caa84cbe57912e0dfd2fadf3dfb50ca534e9b5d19.scope. May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f73f2f8af58 items=0 ppid=4152 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:33.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353038343237373432653864396430653739643237636161383463 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit: BPF prog-id=216 op=LOAD May 17 00:49:33.918000 audit[4635]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000354c78 items=0 ppid=4152 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:33.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353038343237373432653864396430653739643237636161383463 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.918000 audit: BPF prog-id=217 op=LOAD May 17 00:49:33.918000 audit[4635]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000354cc8 items=0 ppid=4152 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:33.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353038343237373432653864396430653739643237636161383463 May 17 00:49:33.918000 audit: BPF prog-id=217 op=UNLOAD May 17 00:49:33.919000 audit: BPF prog-id=216 op=UNLOAD May 17 00:49:33.919000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { perfmon } for pid=4635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit[4635]: AVC avc: denied { bpf } for pid=4635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:33.919000 audit: BPF prog-id=218 op=LOAD May 17 00:49:33.919000 audit[4635]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000354d58 items=0 ppid=4152 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353038343237373432653864396430653739643237636161383463 May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.871 [WARNING][4623] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"996c6d29-266c-48b3-a5d3-e06154625b48", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9", Pod:"calico-apiserver-6d846f879f-7ch5r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3201fe3750", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.871 [INFO][4623] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.871 [INFO][4623] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" iface="eth0" netns="" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.871 [INFO][4623] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.871 [INFO][4623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.935 [INFO][4646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.935 [INFO][4646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.935 [INFO][4646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.943 [WARNING][4646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.944 [INFO][4646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.947 [INFO][4646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:33.960388 env[1186]: 2025-05-17 00:49:33.953 [INFO][4623] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:33.961547 env[1186]: time="2025-05-17T00:49:33.961307969Z" level=info msg="StartContainer for \"9f508427742e8d9d0e79d27caa84cbe57912e0dfd2fadf3dfb50ca534e9b5d19\" returns successfully" May 17 00:49:33.961547 env[1186]: time="2025-05-17T00:49:33.960433922Z" level=info msg="TearDown network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" successfully" May 17 00:49:33.961547 env[1186]: time="2025-05-17T00:49:33.961455818Z" level=info msg="StopPodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" returns successfully" May 17 00:49:33.962879 env[1186]: time="2025-05-17T00:49:33.962847377Z" level=info msg="RemovePodSandbox for \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" May 17 00:49:33.963096 env[1186]: time="2025-05-17T00:49:33.963028580Z" level=info msg="Forcibly stopping sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\"" May 17 00:49:34.018414 env[1186]: time="2025-05-17T00:49:34.018325277Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:34.023633 env[1186]: time="2025-05-17T00:49:34.023537466Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:34.029035 kubelet[1950]: E0517 00:49:34.028888 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:34.032381 kubelet[1950]: E0517 00:49:34.032098 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:34.038840 kubelet[1950]: E0517 00:49:34.038734 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5cz4l,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:34.066737 kubelet[1950]: E0517 00:49:34.063195 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:34.154326 kubelet[1950]: I0517 00:49:34.154193 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gkf98" podStartSLOduration=29.918453766 podStartE2EDuration="39.149214612s" podCreationTimestamp="2025-05-17 00:48:55 +0000 UTC" firstStartedPulling="2025-05-17 00:49:24.54831237 +0000 UTC m=+52.389285639" lastFinishedPulling="2025-05-17 00:49:33.779073207 +0000 UTC m=+61.620046485" observedRunningTime="2025-05-17 00:49:34.144406897 +0000 UTC m=+61.985380180" watchObservedRunningTime="2025-05-17 00:49:34.149214612 +0000 UTC m=+61.990187901" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.047 [WARNING][4677] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"996c6d29-266c-48b3-a5d3-e06154625b48", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"b3527126b0101b65c21a9f53a734bf1ff458f3457aec54bcaee45bff92bea5f9", Pod:"calico-apiserver-6d846f879f-7ch5r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3201fe3750", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.048 [INFO][4677] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.048 [INFO][4677] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" iface="eth0" netns="" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.048 [INFO][4677] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.048 [INFO][4677] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.181 [INFO][4688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.181 [INFO][4688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.181 [INFO][4688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.195 [WARNING][4688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.195 [INFO][4688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" HandleID="k8s-pod-network.53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--7ch5r-eth0" May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.199 [INFO][4688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.207830 env[1186]: 2025-05-17 00:49:34.204 [INFO][4677] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e" May 17 00:49:34.209275 env[1186]: time="2025-05-17T00:49:34.208321859Z" level=info msg="TearDown network for sandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" successfully" May 17 00:49:34.212627 env[1186]: time="2025-05-17T00:49:34.212534713Z" level=info msg="RemovePodSandbox \"53f78e49241bf5ad71b7cc7c37aa19c8816d08c0ea7471e009b134577b1a8d7e\" returns successfully" May 17 00:49:34.215514 env[1186]: time="2025-05-17T00:49:34.215461012Z" level=info msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.275 [WARNING][4703] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"e695e6ca-70af-4c0a-aa8b-bbd459269076", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292", Pod:"goldmane-8f77d7b6c-qvcxd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicf3bf59d84e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.275 [INFO][4703] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.275 [INFO][4703] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" iface="eth0" netns="" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.275 [INFO][4703] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.275 [INFO][4703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.309 [INFO][4710] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.309 [INFO][4710] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.309 [INFO][4710] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.322 [WARNING][4710] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.322 [INFO][4710] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.324 [INFO][4710] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.332234 env[1186]: 2025-05-17 00:49:34.327 [INFO][4703] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.332234 env[1186]: time="2025-05-17T00:49:34.330854873Z" level=info msg="TearDown network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" successfully" May 17 00:49:34.332234 env[1186]: time="2025-05-17T00:49:34.330899963Z" level=info msg="StopPodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" returns successfully" May 17 00:49:34.334243 env[1186]: time="2025-05-17T00:49:34.334022952Z" level=info msg="RemovePodSandbox for \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" May 17 00:49:34.334628 env[1186]: time="2025-05-17T00:49:34.334452963Z" level=info msg="Forcibly stopping sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\"" May 17 00:49:34.474173 env[1186]: time="2025-05-17T00:49:34.474005512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.407 [WARNING][4724] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"e695e6ca-70af-4c0a-aa8b-bbd459269076", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"d254f69f9b1a4e9ed64f220cf9f28a5c13aebb6565497d2ab22832ce095f7292", Pod:"goldmane-8f77d7b6c-qvcxd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicf3bf59d84e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.407 [INFO][4724] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.408 [INFO][4724] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" iface="eth0" netns="" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.408 [INFO][4724] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.408 [INFO][4724] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.451 [INFO][4731] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.452 [INFO][4731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.452 [INFO][4731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.471 [WARNING][4731] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.471 [INFO][4731] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" HandleID="k8s-pod-network.4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" Workload="ci--3510.3.7--n--f656071047-k8s-goldmane--8f77d7b6c--qvcxd-eth0" May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.478 [INFO][4731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.490961 env[1186]: 2025-05-17 00:49:34.485 [INFO][4724] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8" May 17 00:49:34.491710 env[1186]: time="2025-05-17T00:49:34.491658250Z" level=info msg="TearDown network for sandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" successfully" May 17 00:49:34.495169 env[1186]: time="2025-05-17T00:49:34.495102163Z" level=info msg="RemovePodSandbox \"4ce2b1d222f15add39e7941ce34d4e7346cdcc858949ac57b7da5fec5d1927b8\" returns successfully" May 17 00:49:34.496156 env[1186]: time="2025-05-17T00:49:34.496096826Z" level=info msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.563 [WARNING][4746] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0", GenerateName:"calico-kube-controllers-86d6858c89-", Namespace:"calico-system", SelfLink:"", UID:"bca9900e-9230-46ca-a87f-24baf2ab2a74", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86d6858c89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12", Pod:"calico-kube-controllers-86d6858c89-btznn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5be5b6ea32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.564 [INFO][4746] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.564 [INFO][4746] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" iface="eth0" netns="" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.564 [INFO][4746] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.564 [INFO][4746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.605 [INFO][4753] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.605 [INFO][4753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.605 [INFO][4753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.616 [WARNING][4753] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.616 [INFO][4753] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.620 [INFO][4753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.626259 env[1186]: 2025-05-17 00:49:34.623 [INFO][4746] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.627171 env[1186]: time="2025-05-17T00:49:34.626382710Z" level=info msg="TearDown network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" successfully" May 17 00:49:34.627171 env[1186]: time="2025-05-17T00:49:34.626431364Z" level=info msg="StopPodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" returns successfully" May 17 00:49:34.627826 env[1186]: time="2025-05-17T00:49:34.627772107Z" level=info msg="RemovePodSandbox for \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" May 17 00:49:34.628095 env[1186]: time="2025-05-17T00:49:34.628041819Z" level=info msg="Forcibly stopping sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\"" May 17 00:49:34.712700 kubelet[1950]: I0517 00:49:34.711179 1950 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:49:34.715300 kubelet[1950]: I0517 00:49:34.715247 1950 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:49:34.716067 env[1186]: time="2025-05-17T00:49:34.715789423Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:34.717557 env[1186]: time="2025-05-17T00:49:34.717327662Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:34.719542 kubelet[1950]: E0517 00:49:34.718058 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:34.719946 kubelet[1950]: E0517 00:49:34.719898 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:34.720288 kubelet[1950]: E0517 00:49:34.720230 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ec5b00b99e7c48b0837097a3f87732db,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:34.728541 env[1186]: time="2025-05-17T00:49:34.728484457Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.733 [WARNING][4767] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0", GenerateName:"calico-kube-controllers-86d6858c89-", Namespace:"calico-system", SelfLink:"", UID:"bca9900e-9230-46ca-a87f-24baf2ab2a74", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86d6858c89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"dd2d2e70478ed42550f086014b4c29d12ea9ffe244203d71e2329b3260b0fd12", Pod:"calico-kube-controllers-86d6858c89-btznn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5be5b6ea32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.735 [INFO][4767] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.735 [INFO][4767] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" iface="eth0" netns="" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.736 [INFO][4767] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.736 [INFO][4767] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.820 [INFO][4774] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.820 [INFO][4774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.820 [INFO][4774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.830 [WARNING][4774] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.830 [INFO][4774] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" HandleID="k8s-pod-network.3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" Workload="ci--3510.3.7--n--f656071047-k8s-calico--kube--controllers--86d6858c89--btznn-eth0" May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.834 [INFO][4774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.839851 env[1186]: 2025-05-17 00:49:34.836 [INFO][4767] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2" May 17 00:49:34.841089 env[1186]: time="2025-05-17T00:49:34.840751339Z" level=info msg="TearDown network for sandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" successfully" May 17 00:49:34.844708 env[1186]: time="2025-05-17T00:49:34.844644795Z" level=info msg="RemovePodSandbox \"3e738f78fbd7f01427094f9960ddc55e7cac6488313d5f8a0950243e25834df2\" returns successfully" May 17 00:49:34.845400 env[1186]: time="2025-05-17T00:49:34.845355695Z" level=info msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" May 17 00:49:34.947994 env[1186]: time="2025-05-17T00:49:34.946111208Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:34.947994 env[1186]: time="2025-05-17T00:49:34.946990901Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:34.948183 kubelet[1950]: E0517 00:49:34.947340 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:34.948183 kubelet[1950]: E0517 00:49:34.947426 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:34.948183 kubelet[1950]: E0517 00:49:34.947630 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:34.949930 kubelet[1950]: E0517 00:49:34.949863 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.906 [WARNING][4788] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"27c3d624-d977-468e-a5a3-c72cbb3b2e4d", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f", Pod:"calico-apiserver-6d846f879f-xdqfj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60a659cd789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.906 [INFO][4788] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.906 [INFO][4788] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" iface="eth0" netns="" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.906 [INFO][4788] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.906 [INFO][4788] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.950 [INFO][4796] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.950 [INFO][4796] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.950 [INFO][4796] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.962 [WARNING][4796] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.962 [INFO][4796] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.965 [INFO][4796] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:34.970162 env[1186]: 2025-05-17 00:49:34.967 [INFO][4788] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:34.971314 env[1186]: time="2025-05-17T00:49:34.970206802Z" level=info msg="TearDown network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" successfully" May 17 00:49:34.971314 env[1186]: time="2025-05-17T00:49:34.970255577Z" level=info msg="StopPodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" returns successfully" May 17 00:49:34.971509 env[1186]: time="2025-05-17T00:49:34.971467065Z" level=info msg="RemovePodSandbox for \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" May 17 00:49:34.971715 env[1186]: time="2025-05-17T00:49:34.971664122Z" level=info msg="Forcibly stopping sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\"" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.035 [WARNING][4811] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0", GenerateName:"calico-apiserver-6d846f879f-", Namespace:"calico-apiserver", SelfLink:"", UID:"27c3d624-d977-468e-a5a3-c72cbb3b2e4d", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d846f879f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"106038d08e8860625fba8980d7c5bee20e970f585e4cdc4930f628eda4e9a33f", Pod:"calico-apiserver-6d846f879f-xdqfj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60a659cd789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.036 [INFO][4811] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.036 [INFO][4811] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" iface="eth0" netns="" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.036 [INFO][4811] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.036 [INFO][4811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.072 [INFO][4819] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.072 [INFO][4819] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.073 [INFO][4819] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.082 [WARNING][4819] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.082 [INFO][4819] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" HandleID="k8s-pod-network.53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" Workload="ci--3510.3.7--n--f656071047-k8s-calico--apiserver--6d846f879f--xdqfj-eth0" May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.085 [INFO][4819] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:35.091972 env[1186]: 2025-05-17 00:49:35.088 [INFO][4811] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d" May 17 00:49:35.093400 env[1186]: time="2025-05-17T00:49:35.092883529Z" level=info msg="TearDown network for sandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" successfully" May 17 00:49:35.100786 env[1186]: time="2025-05-17T00:49:35.100737026Z" level=info msg="RemovePodSandbox \"53d5ae491c84a5dca2d6149d8542aeb7d1dce4095166d36befcaba0dfc5c4e6d\" returns successfully" May 17 00:49:35.102505 env[1186]: time="2025-05-17T00:49:35.102442549Z" level=info msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.171 [WARNING][4834] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"58e0b9ad-f250-4b99-a906-e77515643e8e", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da", Pod:"coredns-7c65d6cfc9-797cd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43f10179087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.171 [INFO][4834] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.171 [INFO][4834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" iface="eth0" netns="" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.171 [INFO][4834] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.171 [INFO][4834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.209 [INFO][4841] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.209 [INFO][4841] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.210 [INFO][4841] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.226 [WARNING][4841] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.226 [INFO][4841] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.229 [INFO][4841] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:35.241654 env[1186]: 2025-05-17 00:49:35.234 [INFO][4834] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.241654 env[1186]: time="2025-05-17T00:49:35.240275744Z" level=info msg="TearDown network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" successfully" May 17 00:49:35.241654 env[1186]: time="2025-05-17T00:49:35.240324841Z" level=info msg="StopPodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" returns successfully" May 17 00:49:35.243421 env[1186]: time="2025-05-17T00:49:35.243355854Z" level=info msg="RemovePodSandbox for \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" May 17 00:49:35.244000 env[1186]: time="2025-05-17T00:49:35.243913342Z" level=info msg="Forcibly stopping sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\"" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.311 [WARNING][4856] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"58e0b9ad-f250-4b99-a906-e77515643e8e", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8a6af005e9ac4eaaa8bb9cc32c16590a892216865a023556cf059df0acd413da", Pod:"coredns-7c65d6cfc9-797cd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43f10179087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.311 [INFO][4856] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.312 [INFO][4856] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" iface="eth0" netns="" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.312 [INFO][4856] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.312 [INFO][4856] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.352 [INFO][4863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.352 [INFO][4863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.352 [INFO][4863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.362 [WARNING][4863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.362 [INFO][4863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" HandleID="k8s-pod-network.e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" Workload="ci--3510.3.7--n--f656071047-k8s-coredns--7c65d6cfc9--797cd-eth0" May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.365 [INFO][4863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:35.371617 env[1186]: 2025-05-17 00:49:35.368 [INFO][4856] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1" May 17 00:49:35.372463 env[1186]: time="2025-05-17T00:49:35.372410428Z" level=info msg="TearDown network for sandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" successfully" May 17 00:49:35.375987 env[1186]: time="2025-05-17T00:49:35.375914030Z" level=info msg="RemovePodSandbox \"e1aa22bc87aeaf603cf557754bb34b08dc29abe59cac1f10a69d132c11e7ccd1\" returns successfully" May 17 00:49:35.377051 env[1186]: time="2025-05-17T00:49:35.377013347Z" level=info msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.448 [WARNING][4877] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bf62d9e0-554d-4665-aa65-a32531beade4", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab", Pod:"csi-node-driver-gkf98", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibcd401ecc93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.449 [INFO][4877] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.451 [INFO][4877] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" iface="eth0" netns="" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.452 [INFO][4877] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.452 [INFO][4877] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.494 [INFO][4885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.494 [INFO][4885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.494 [INFO][4885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.505 [WARNING][4885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.505 [INFO][4885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.508 [INFO][4885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:35.515799 env[1186]: 2025-05-17 00:49:35.512 [INFO][4877] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.515799 env[1186]: time="2025-05-17T00:49:35.515700838Z" level=info msg="TearDown network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" successfully" May 17 00:49:35.515799 env[1186]: time="2025-05-17T00:49:35.515748634Z" level=info msg="StopPodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" returns successfully" May 17 00:49:35.519747 env[1186]: time="2025-05-17T00:49:35.517403097Z" level=info msg="RemovePodSandbox for \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" May 17 00:49:35.520060 env[1186]: time="2025-05-17T00:49:35.519972919Z" level=info msg="Forcibly stopping sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\"" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.593 [WARNING][4899] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bf62d9e0-554d-4665-aa65-a32531beade4", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f656071047", ContainerID:"8da389527b3440be70dc8f4161b651ab5f0c12a6c7c26f4eb3cc1a5057e698ab", Pod:"csi-node-driver-gkf98", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibcd401ecc93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.594 [INFO][4899] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.594 [INFO][4899] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" iface="eth0" netns="" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.594 [INFO][4899] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.594 [INFO][4899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.636 [INFO][4906] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.636 [INFO][4906] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.636 [INFO][4906] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.647 [WARNING][4906] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.647 [INFO][4906] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" HandleID="k8s-pod-network.0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" Workload="ci--3510.3.7--n--f656071047-k8s-csi--node--driver--gkf98-eth0" May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.651 [INFO][4906] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:35.657324 env[1186]: 2025-05-17 00:49:35.654 [INFO][4899] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f" May 17 00:49:35.660297 env[1186]: time="2025-05-17T00:49:35.660220004Z" level=info msg="TearDown network for sandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" successfully" May 17 00:49:35.666467 env[1186]: time="2025-05-17T00:49:35.666406233Z" level=info msg="RemovePodSandbox \"0857cc3f5f89ec721a62c86851be5e07387fee048777ca39d40acb20998b931f\" returns successfully" May 17 00:49:35.688000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:35.688000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d6e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:35.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:35.708000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:35.708000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00191d700 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:35.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:35.709000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:35.709000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d835a0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:35.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:35.710000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:35.710000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d835c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:49:35.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:37.305820 systemd[1]: run-containerd-runc-k8s.io-b4e0c9cf6382b5191d09bbe449ca34409439e25c4b39765fc470b5f2c2c76fc2-runc.Mta9E5.mount: Deactivated successfully. May 17 00:49:39.515074 systemd[1]: run-containerd-runc-k8s.io-241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59-runc.GIyIL5.mount: Deactivated successfully. May 17 00:49:42.812512 systemd[1]: Started sshd@9-24.199.117.67:22-147.75.109.163:33230.service. May 17 00:49:42.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.199.117.67:22-147.75.109.163:33230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:42.817010 kernel: kauditd_printk_skb: 100 callbacks suppressed May 17 00:49:42.822416 kernel: audit: type=1130 audit(1747442982.815:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.199.117.67:22-147.75.109.163:33230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:42.972000 audit[4966]: USER_ACCT pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:42.979290 sshd[4966]: Accepted publickey for core from 147.75.109.163 port 33230 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:49:42.980025 kernel: audit: type=1101 audit(1747442982.972:1417): pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:42.979000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:42.984987 kernel: audit: type=1103 audit(1747442982.979:1418): pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:42.987631 kernel: audit: type=1006 audit(1747442982.983:1419): pid=4966 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:49:42.983000 audit[4966]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f4f52e0 a2=3 a3=0 items=0 ppid=1 pid=4966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:42.992958 kernel: audit: type=1300 audit(1747442982.983:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f4f52e0 a2=3 a3=0 items=0 ppid=1 pid=4966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:42.993019 sshd[4966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:42.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:42.995668 kernel: audit: type=1327 audit(1747442982.983:1419): proctitle=737368643A20636F7265205B707269765D May 17 00:49:43.022884 systemd-logind[1173]: New session 10 of user core. May 17 00:49:43.025704 systemd[1]: Started session-10.scope. May 17 00:49:43.036000 audit[4966]: USER_START pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:43.044562 kernel: audit: type=1105 audit(1747442983.036:1420): pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:43.044731 kernel: audit: type=1103 audit(1747442983.043:1421): pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:43.043000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:44.133202 sshd[4966]: pam_unix(sshd:session): session closed for user core May 17 00:49:44.136000 audit[4966]: USER_END pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:44.144296 kernel: audit: type=1106 audit(1747442984.136:1422): pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:44.144729 kernel: audit: type=1104 audit(1747442984.136:1423): pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:44.136000 audit[4966]: CRED_DISP pid=4966 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:44.145356 systemd[1]: sshd@9-24.199.117.67:22-147.75.109.163:33230.service: Deactivated successfully. May 17 00:49:44.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.199.117.67:22-147.75.109.163:33230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:44.149332 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:49:44.150906 systemd-logind[1173]: Session 10 logged out. Waiting for processes to exit. May 17 00:49:44.152392 systemd-logind[1173]: Removed session 10. May 17 00:49:44.501374 kubelet[1950]: E0517 00:49:44.501204 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:44.506088 kubelet[1950]: E0517 00:49:44.506021 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:49.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-24.199.117.67:22-147.75.109.163:49642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:49.145878 systemd[1]: Started sshd@10-24.199.117.67:22-147.75.109.163:49642.service. May 17 00:49:49.147713 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:49:49.147854 kernel: audit: type=1130 audit(1747442989.145:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-24.199.117.67:22-147.75.109.163:49642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:49.228834 sshd[4988]: Accepted publickey for core from 147.75.109.163 port 49642 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:49:49.228000 audit[4988]: USER_ACCT pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.234645 kernel: audit: type=1101 audit(1747442989.228:1426): pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.234000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.240101 kernel: audit: type=1103 audit(1747442989.234:1427): pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.240038 sshd[4988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:49.243620 kernel: audit: type=1006 audit(1747442989.234:1428): pid=4988 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:49:49.234000 audit[4988]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff188f4520 a2=3 a3=0 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:49.248627 kernel: audit: type=1300 audit(1747442989.234:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff188f4520 a2=3 a3=0 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:49.248815 kernel: audit: type=1327 audit(1747442989.234:1428): proctitle=737368643A20636F7265205B707269765D May 17 00:49:49.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:49.260201 systemd[1]: Started session-11.scope. May 17 00:49:49.260793 systemd-logind[1173]: New session 11 of user core. May 17 00:49:49.268000 audit[4988]: USER_START pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.273694 kernel: audit: type=1105 audit(1747442989.268:1429): pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.274000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.279061 kernel: audit: type=1103 audit(1747442989.274:1430): pid=4990 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.467743 kubelet[1950]: E0517 00:49:49.467360 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:49:49.634260 sshd[4988]: pam_unix(sshd:session): session closed for user core May 17 00:49:49.635000 audit[4988]: USER_END pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.643647 kernel: audit: type=1106 audit(1747442989.635:1431): pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.643732 systemd[1]: sshd@10-24.199.117.67:22-147.75.109.163:49642.service: Deactivated successfully. May 17 00:49:49.645024 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:49:49.636000 audit[4988]: CRED_DISP pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.649746 kernel: audit: type=1104 audit(1747442989.636:1432): pid=4988 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:49.649687 systemd-logind[1173]: Session 11 logged out. Waiting for processes to exit. May 17 00:49:49.652311 systemd-logind[1173]: Removed session 11. May 17 00:49:49.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-24.199.117.67:22-147.75.109.163:49642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:54.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-24.199.117.67:22-147.75.109.163:49652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:54.646553 systemd[1]: Started sshd@11-24.199.117.67:22-147.75.109.163:49652.service. May 17 00:49:54.651020 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:49:54.651091 kernel: audit: type=1130 audit(1747442994.646:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-24.199.117.67:22-147.75.109.163:49652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:54.741476 sshd[5003]: Accepted publickey for core from 147.75.109.163 port 49652 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:49:54.740000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.749087 kernel: audit: type=1101 audit(1747442994.740:1435): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.750000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.756656 kernel: audit: type=1103 audit(1747442994.750:1436): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.758095 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:54.756000 audit[5003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e47d560 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:54.765436 kernel: audit: type=1006 audit(1747442994.756:1437): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:49:54.765715 kernel: audit: type=1300 audit(1747442994.756:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e47d560 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:54.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:54.769726 kernel: audit: type=1327 audit(1747442994.756:1437): proctitle=737368643A20636F7265205B707269765D May 17 00:49:54.775035 systemd-logind[1173]: New session 12 of user core. May 17 00:49:54.775908 systemd[1]: Started session-12.scope. May 17 00:49:54.792000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.797741 kernel: audit: type=1105 audit(1747442994.792:1438): pid=5003 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.799000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:54.804736 kernel: audit: type=1103 audit(1747442994.799:1439): pid=5005 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.055061 sshd[5003]: pam_unix(sshd:session): session closed for user core May 17 00:49:55.063000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.071415 kernel: audit: type=1106 audit(1747442995.063:1440): pid=5003 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.069784 systemd[1]: Started sshd@12-24.199.117.67:22-147.75.109.163:49666.service. May 17 00:49:55.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.199.117.67:22-147.75.109.163:49666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.073261 systemd[1]: sshd@11-24.199.117.67:22-147.75.109.163:49652.service: Deactivated successfully. May 17 00:49:55.074619 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:49:55.077798 kernel: audit: type=1130 audit(1747442995.069:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.199.117.67:22-147.75.109.163:49666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.078007 systemd-logind[1173]: Session 12 logged out. Waiting for processes to exit. May 17 00:49:55.080687 systemd-logind[1173]: Removed session 12. May 17 00:49:55.070000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-24.199.117.67:22-147.75.109.163:49652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.142000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.143628 sshd[5014]: Accepted publickey for core from 147.75.109.163 port 49666 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:49:55.145000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.145000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e5a1040 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:55.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:55.147796 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:55.157089 systemd-logind[1173]: New session 13 of user core. May 17 00:49:55.159126 systemd[1]: Started session-13.scope. May 17 00:49:55.167000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.170000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.513403 sshd[5014]: pam_unix(sshd:session): session closed for user core May 17 00:49:55.515653 systemd[1]: Started sshd@13-24.199.117.67:22-147.75.109.163:49674.service. May 17 00:49:55.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-24.199.117.67:22-147.75.109.163:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.518000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.518000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.199.117.67:22-147.75.109.163:49666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.522111 systemd[1]: sshd@12-24.199.117.67:22-147.75.109.163:49666.service: Deactivated successfully. May 17 00:49:55.523430 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:49:55.526292 systemd-logind[1173]: Session 13 logged out. Waiting for processes to exit. May 17 00:49:55.528124 systemd-logind[1173]: Removed session 13. May 17 00:49:55.606000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.607547 sshd[5025]: Accepted publickey for core from 147.75.109.163 port 49674 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:49:55.609000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.609000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5b5d2be0 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:55.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:55.611295 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:55.622354 systemd-logind[1173]: New session 14 of user core. May 17 00:49:55.623530 systemd[1]: Started session-14.scope. May 17 00:49:55.633000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.635000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.871172 sshd[5025]: pam_unix(sshd:session): session closed for user core May 17 00:49:55.873000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.873000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:55.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-24.199.117.67:22-147.75.109.163:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:55.876821 systemd[1]: sshd@13-24.199.117.67:22-147.75.109.163:49674.service: Deactivated successfully. May 17 00:49:55.877817 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:49:55.880742 systemd-logind[1173]: Session 14 logged out. Waiting for processes to exit. May 17 00:49:55.882642 systemd-logind[1173]: Removed session 14. May 17 00:49:56.941001 kubelet[1950]: I0517 00:49:56.940920 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:57.283000 audit[5038]: NETFILTER_CFG table=filter:121 family=2 entries=13 op=nft_register_rule pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:57.283000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc6a4f2900 a2=0 a3=7ffc6a4f28ec items=0 ppid=2068 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:57.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:57.292000 audit[5038]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:57.292000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc6a4f2900 a2=0 a3=7ffc6a4f28ec items=0 ppid=2068 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:57.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:57.460112 kubelet[1950]: E0517 00:49:57.460024 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:57.476191 kubelet[1950]: E0517 00:49:57.476140 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:49:58.469142 env[1186]: time="2025-05-17T00:49:58.469072315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:58.674744 env[1186]: time="2025-05-17T00:49:58.674654861Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:58.675634 env[1186]: time="2025-05-17T00:49:58.675532907Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:58.677172 kubelet[1950]: E0517 00:49:58.677079 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:58.677967 kubelet[1950]: E0517 00:49:58.677232 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:58.687624 kubelet[1950]: E0517 00:49:58.687520 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5cz4l,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:58.689233 kubelet[1950]: E0517 00:49:58.689174 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:49:59.165004 kubelet[1950]: I0517 00:49:59.164963 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:59.253000 audit[5040]: NETFILTER_CFG table=filter:123 family=2 entries=12 op=nft_register_rule pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:59.253000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd8ad49da0 a2=0 a3=7ffd8ad49d8c items=0 ppid=2068 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:59.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:59.259000 audit[5040]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:59.259000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd8ad49da0 a2=0 a3=7ffd8ad49d8c items=0 ppid=2068 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:59.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:00.880351 systemd[1]: Started sshd@14-24.199.117.67:22-147.75.109.163:57128.service. May 17 00:50:00.885935 kernel: kauditd_printk_skb: 35 callbacks suppressed May 17 00:50:00.886135 kernel: audit: type=1130 audit(1747443000.879:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-24.199.117.67:22-147.75.109.163:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:00.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-24.199.117.67:22-147.75.109.163:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:01.021649 sshd[5042]: Accepted publickey for core from 147.75.109.163 port 57128 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:01.020000 audit[5042]: USER_ACCT pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.027626 kernel: audit: type=1101 audit(1747443001.020:1466): pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.028000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.032669 kernel: audit: type=1103 audit(1747443001.028:1467): pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.035623 kernel: audit: type=1006 audit(1747443001.028:1468): pid=5042 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:50:01.036390 sshd[5042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:01.028000 audit[5042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb2193c0 a2=3 a3=0 items=0 ppid=1 pid=5042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:01.041622 kernel: audit: type=1300 audit(1747443001.028:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb2193c0 a2=3 a3=0 items=0 ppid=1 pid=5042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:01.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:01.049631 kernel: audit: type=1327 audit(1747443001.028:1468): proctitle=737368643A20636F7265205B707269765D May 17 00:50:01.057426 systemd-logind[1173]: New session 15 of user core. May 17 00:50:01.058366 systemd[1]: Started session-15.scope. May 17 00:50:01.076760 kernel: audit: type=1105 audit(1747443001.069:1469): pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.069000 audit[5042]: USER_START pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.084164 kernel: audit: type=1103 audit(1747443001.077:1470): pid=5044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.077000 audit[5044]: CRED_ACQ pid=5044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.491317 sshd[5042]: pam_unix(sshd:session): session closed for user core May 17 00:50:01.493000 audit[5042]: USER_END pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.500633 kernel: audit: type=1106 audit(1747443001.493:1471): pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.501000 audit[5042]: CRED_DISP pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.505034 systemd[1]: sshd@14-24.199.117.67:22-147.75.109.163:57128.service: Deactivated successfully. May 17 00:50:01.506189 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:50:01.510495 kernel: audit: type=1104 audit(1747443001.501:1472): pid=5042 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:01.509692 systemd-logind[1173]: Session 15 logged out. Waiting for processes to exit. May 17 00:50:01.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-24.199.117.67:22-147.75.109.163:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:01.512163 systemd-logind[1173]: Removed session 15. May 17 00:50:02.472064 env[1186]: time="2025-05-17T00:50:02.471637777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:50:02.715997 env[1186]: time="2025-05-17T00:50:02.715455650Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:02.730830 env[1186]: time="2025-05-17T00:50:02.730551612Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:02.731431 kubelet[1950]: E0517 00:50:02.731218 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:02.731431 kubelet[1950]: E0517 00:50:02.731299 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:02.731877 kubelet[1950]: E0517 00:50:02.731507 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ec5b00b99e7c48b0837097a3f87732db,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:02.736550 env[1186]: time="2025-05-17T00:50:02.736261429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:50:02.976182 env[1186]: time="2025-05-17T00:50:02.976079879Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:02.977973 env[1186]: time="2025-05-17T00:50:02.977419531Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:02.979898 kubelet[1950]: E0517 00:50:02.978912 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:02.980313 kubelet[1950]: E0517 00:50:02.980249 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:02.983090 kubelet[1950]: E0517 00:50:02.981036 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:02.984862 kubelet[1950]: E0517 00:50:02.984737 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:50:06.503816 systemd[1]: Started sshd@15-24.199.117.67:22-147.75.109.163:57140.service. May 17 00:50:06.508807 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:06.508994 kernel: audit: type=1130 audit(1747443006.505:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-24.199.117.67:22-147.75.109.163:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-24.199.117.67:22-147.75.109.163:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.610000 audit[5057]: USER_ACCT pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.616097 sshd[5057]: Accepted publickey for core from 147.75.109.163 port 57140 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:06.616941 kernel: audit: type=1101 audit(1747443006.610:1475): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.616000 audit[5057]: CRED_ACQ pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.621638 kernel: audit: type=1103 audit(1747443006.616:1476): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.621843 kernel: audit: type=1006 audit(1747443006.617:1477): pid=5057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:50:06.622466 sshd[5057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:06.617000 audit[5057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef327020 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:06.629071 kernel: audit: type=1300 audit(1747443006.617:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef327020 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:06.617000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:06.633775 kernel: audit: type=1327 audit(1747443006.617:1477): proctitle=737368643A20636F7265205B707269765D May 17 00:50:06.635751 systemd-logind[1173]: New session 16 of user core. May 17 00:50:06.638684 systemd[1]: Started session-16.scope. May 17 00:50:06.670000 audit[5057]: USER_START pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.676624 kernel: audit: type=1105 audit(1747443006.670:1478): pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.677000 audit[5059]: CRED_ACQ pid=5059 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:06.682689 kernel: audit: type=1103 audit(1747443006.677:1479): pid=5059 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:07.045566 sshd[5057]: pam_unix(sshd:session): session closed for user core May 17 00:50:07.048000 audit[5057]: USER_END pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:07.053975 kernel: audit: type=1106 audit(1747443007.048:1480): pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:07.054000 audit[5057]: CRED_DISP pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:07.058280 systemd-logind[1173]: Session 16 logged out. Waiting for processes to exit. May 17 00:50:07.060702 kernel: audit: type=1104 audit(1747443007.054:1481): pid=5057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:07.060255 systemd[1]: sshd@15-24.199.117.67:22-147.75.109.163:57140.service: Deactivated successfully. May 17 00:50:07.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-24.199.117.67:22-147.75.109.163:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:07.061802 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:50:07.062947 systemd-logind[1173]: Removed session 16. May 17 00:50:09.532752 systemd[1]: run-containerd-runc-k8s.io-241c509947107739eb12a23b420f7584c9c2205b23215170bccfa7e19cbe7a59-runc.EB6IHv.mount: Deactivated successfully. May 17 00:50:11.531935 kubelet[1950]: E0517 00:50:11.531855 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:50:12.060169 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:12.060491 kernel: audit: type=1130 audit(1747443012.054:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-24.199.117.67:22-147.75.109.163:33290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-24.199.117.67:22-147.75.109.163:33290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.054400 systemd[1]: Started sshd@16-24.199.117.67:22-147.75.109.163:33290.service. May 17 00:50:12.209000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.215633 kernel: audit: type=1101 audit(1747443012.209:1484): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.215853 sshd[5120]: Accepted publickey for core from 147.75.109.163 port 33290 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:12.216000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.225627 kernel: audit: type=1103 audit(1747443012.216:1485): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.225809 kernel: audit: type=1006 audit(1747443012.216:1486): pid=5120 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:50:12.216000 audit[5120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0f6f6c0 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.232965 kernel: audit: type=1300 audit(1747443012.216:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0f6f6c0 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.233086 kernel: audit: type=1327 audit(1747443012.216:1486): proctitle=737368643A20636F7265205B707269765D May 17 00:50:12.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:12.233565 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:12.247187 systemd-logind[1173]: New session 17 of user core. May 17 00:50:12.247531 systemd[1]: Started session-17.scope. May 17 00:50:12.257000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.263646 kernel: audit: type=1105 audit(1747443012.257:1487): pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.264000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.269649 kernel: audit: type=1103 audit(1747443012.264:1488): pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.803581 sshd[5120]: pam_unix(sshd:session): session closed for user core May 17 00:50:12.807000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.814751 kernel: audit: type=1106 audit(1747443012.807:1489): pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.818905 kernel: audit: type=1104 audit(1747443012.807:1490): pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.807000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:12.815421 systemd[1]: sshd@16-24.199.117.67:22-147.75.109.163:33290.service: Deactivated successfully. May 17 00:50:12.816426 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:50:12.820468 systemd-logind[1173]: Session 17 logged out. Waiting for processes to exit. May 17 00:50:12.821788 systemd-logind[1173]: Removed session 17. May 17 00:50:12.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-24.199.117.67:22-147.75.109.163:33290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:13.476571 kubelet[1950]: E0517 00:50:13.476479 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:50:15.462547 kubelet[1950]: E0517 00:50:15.462479 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:50:17.813385 systemd[1]: Started sshd@17-24.199.117.67:22-147.75.109.163:33298.service. May 17 00:50:17.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-24.199.117.67:22-147.75.109.163:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:17.815448 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:17.815537 kernel: audit: type=1130 audit(1747443017.813:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-24.199.117.67:22-147.75.109.163:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:17.894907 sshd[5131]: Accepted publickey for core from 147.75.109.163 port 33298 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:17.894000 audit[5131]: USER_ACCT pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.899762 kernel: audit: type=1101 audit(1747443017.894:1493): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.899963 sshd[5131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:17.898000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.904983 kernel: audit: type=1103 audit(1747443017.898:1494): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.907233 kernel: audit: type=1006 audit(1747443017.898:1495): pid=5131 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 00:50:17.907343 kernel: audit: type=1300 audit(1747443017.898:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc369372c0 a2=3 a3=0 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:17.898000 audit[5131]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc369372c0 a2=3 a3=0 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:17.912912 kernel: audit: type=1327 audit(1747443017.898:1495): proctitle=737368643A20636F7265205B707269765D May 17 00:50:17.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:17.918283 systemd-logind[1173]: New session 18 of user core. May 17 00:50:17.919412 systemd[1]: Started session-18.scope. May 17 00:50:17.927000 audit[5131]: USER_START pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.932750 kernel: audit: type=1105 audit(1747443017.927:1496): pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.933000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:17.938671 kernel: audit: type=1103 audit(1747443017.933:1497): pid=5133 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.269194 sshd[5131]: pam_unix(sshd:session): session closed for user core May 17 00:50:18.278000 audit[5131]: USER_END pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.284638 kernel: audit: type=1106 audit(1747443018.278:1498): pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.285415 systemd[1]: Started sshd@18-24.199.117.67:22-147.75.109.163:59138.service. May 17 00:50:18.287944 systemd[1]: sshd@17-24.199.117.67:22-147.75.109.163:33298.service: Deactivated successfully. May 17 00:50:18.283000 audit[5131]: CRED_DISP pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.289542 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:50:18.292724 kernel: audit: type=1104 audit(1747443018.283:1499): pid=5131 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-24.199.117.67:22-147.75.109.163:59138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-24.199.117.67:22-147.75.109.163:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.301439 systemd-logind[1173]: Session 18 logged out. Waiting for processes to exit. May 17 00:50:18.304147 systemd-logind[1173]: Removed session 18. May 17 00:50:18.364338 sshd[5158]: Accepted publickey for core from 147.75.109.163 port 59138 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:18.363000 audit[5158]: USER_ACCT pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.365000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.365000 audit[5158]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd87544730 a2=3 a3=0 items=0 ppid=1 pid=5158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:18.365000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:18.367142 sshd[5158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:18.374892 systemd-logind[1173]: New session 19 of user core. May 17 00:50:18.376614 systemd[1]: Started session-19.scope. May 17 00:50:18.387000 audit[5158]: USER_START pid=5158 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.390000 audit[5161]: CRED_ACQ pid=5161 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.808792 sshd[5158]: pam_unix(sshd:session): session closed for user core May 17 00:50:18.811000 audit[5158]: USER_END pid=5158 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.812000 audit[5158]: CRED_DISP pid=5158 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-24.199.117.67:22-147.75.109.163:59154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.817159 systemd[1]: Started sshd@19-24.199.117.67:22-147.75.109.163:59154.service. May 17 00:50:18.818576 systemd[1]: sshd@18-24.199.117.67:22-147.75.109.163:59138.service: Deactivated successfully. May 17 00:50:18.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-24.199.117.67:22-147.75.109.163:59138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.820323 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:50:18.830645 systemd-logind[1173]: Session 19 logged out. Waiting for processes to exit. May 17 00:50:18.836874 systemd-logind[1173]: Removed session 19. May 17 00:50:18.892000 audit[5171]: USER_ACCT pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.894143 sshd[5171]: Accepted publickey for core from 147.75.109.163 port 59154 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:18.894000 audit[5171]: CRED_ACQ pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.895000 audit[5171]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1f20d680 a2=3 a3=0 items=0 ppid=1 pid=5171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:18.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:18.896464 sshd[5171]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:18.902527 systemd-logind[1173]: New session 20 of user core. May 17 00:50:18.903623 systemd[1]: Started session-20.scope. May 17 00:50:18.910000 audit[5171]: USER_START pid=5171 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:18.912000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.735244 sshd[5171]: pam_unix(sshd:session): session closed for user core May 17 00:50:22.758000 audit[5171]: USER_END pid=5171 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-24.199.117.67:22-147.75.109.163:59166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:22.759000 audit[5171]: CRED_DISP pid=5171 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-24.199.117.67:22-147.75.109.163:59154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:22.758027 systemd[1]: Started sshd@20-24.199.117.67:22-147.75.109.163:59166.service. May 17 00:50:22.767058 systemd[1]: sshd@19-24.199.117.67:22-147.75.109.163:59154.service: Deactivated successfully. May 17 00:50:22.768904 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:50:22.772008 systemd-logind[1173]: Session 20 logged out. Waiting for processes to exit. May 17 00:50:22.775401 systemd-logind[1173]: Removed session 20. May 17 00:50:22.885895 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:50:22.898974 kernel: audit: type=1101 audit(1747443022.881:1520): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.899143 kernel: audit: type=1103 audit(1747443022.887:1521): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.899209 kernel: audit: type=1006 audit(1747443022.891:1522): pid=5186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 17 00:50:22.899844 kernel: audit: type=1300 audit(1747443022.891:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d411510 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.881000 audit[5186]: USER_ACCT pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.887000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.891000 audit[5186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d411510 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.914488 kernel: audit: type=1327 audit(1747443022.891:1522): proctitle=737368643A20636F7265205B707269765D May 17 00:50:22.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:22.915126 sshd[5186]: Accepted publickey for core from 147.75.109.163 port 59166 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:22.901576 sshd[5186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:22.930301 systemd[1]: Started session-21.scope. May 17 00:50:22.941862 systemd-logind[1173]: New session 21 of user core. May 17 00:50:22.971261 kernel: audit: type=1105 audit(1747443022.962:1523): pid=5186 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.962000 audit[5186]: USER_START pid=5186 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.977945 kernel: audit: type=1103 audit(1747443022.971:1524): pid=5190 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:22.971000 audit[5190]: CRED_ACQ pid=5190 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:23.077000 audit[5192]: NETFILTER_CFG table=filter:125 family=2 entries=24 op=nft_register_rule pid=5192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:23.089512 kernel: audit: type=1325 audit(1747443023.077:1525): table=filter:125 family=2 entries=24 op=nft_register_rule pid=5192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:23.090349 kernel: audit: type=1300 audit(1747443023.077:1525): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdd4b7c2f0 a2=0 a3=7ffdd4b7c2dc items=0 ppid=2068 pid=5192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.090455 kernel: audit: type=1327 audit(1747443023.077:1525): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:23.077000 audit[5192]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdd4b7c2f0 a2=0 a3=7ffdd4b7c2dc items=0 ppid=2068 pid=5192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:23.111000 audit[5192]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:23.111000 audit[5192]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdd4b7c2f0 a2=0 a3=0 items=0 ppid=2068 pid=5192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:23.249000 audit[5195]: NETFILTER_CFG table=filter:127 family=2 entries=36 op=nft_register_rule pid=5195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:23.249000 audit[5195]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fffc8664950 a2=0 a3=7fffc866493c items=0 ppid=2068 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:23.265000 audit[5195]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:23.265000 audit[5195]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc8664950 a2=0 a3=0 items=0 ppid=2068 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:24.311070 sshd[5186]: pam_unix(sshd:session): session closed for user core May 17 00:50:24.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-24.199.117.67:22-147.75.109.163:59174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:24.348000 audit[5186]: USER_END pid=5186 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:24.349000 audit[5186]: CRED_DISP pid=5186 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:24.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-24.199.117.67:22-147.75.109.163:59166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:24.340721 systemd[1]: Started sshd@21-24.199.117.67:22-147.75.109.163:59174.service. May 17 00:50:24.352346 systemd[1]: sshd@20-24.199.117.67:22-147.75.109.163:59166.service: Deactivated successfully. May 17 00:50:24.353728 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:50:24.359934 systemd-logind[1173]: Session 21 logged out. Waiting for processes to exit. May 17 00:50:24.368810 systemd-logind[1173]: Removed session 21. May 17 00:50:24.480000 audit[5200]: USER_ACCT pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:24.481755 sshd[5200]: Accepted publickey for core from 147.75.109.163 port 59174 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:24.482000 audit[5200]: CRED_ACQ pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:24.482000 audit[5200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc3e69340 a2=3 a3=0 items=0 ppid=1 pid=5200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:24.484848 sshd[5200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:24.509380 systemd-logind[1173]: New session 22 of user core. May 17 00:50:24.509932 systemd[1]: Started session-22.scope. May 17 00:50:24.519000 audit[5200]: USER_START pid=5200 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:24.521000 audit[5203]: CRED_ACQ pid=5203 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:26.224398 kubelet[1950]: E0517 00:50:26.221651 1950 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.263s" May 17 00:50:26.784491 kubelet[1950]: E0517 00:50:26.780997 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:50:27.154000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.154000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00191df80 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:27.154000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:27.155000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.155000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fb07b0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:27.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:27.873000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.873000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00811e6f0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.875000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.875000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00811e990 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.875000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.886000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.887892 kernel: kauditd_printk_skb: 32 callbacks suppressed May 17 00:50:27.913626 kernel: audit: type=1400 audit(1747443027.886:1542): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.914217 kernel: audit: type=1300 audit(1747443027.886:1542): arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0072d2440 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.914294 kernel: audit: type=1327 audit(1747443027.886:1542): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.914344 kernel: audit: type=1400 audit(1747443027.902:1543): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.914385 kernel: audit: type=1300 audit(1747443027.902:1543): arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0118f40c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.886000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0072d2440 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.902000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.902000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0118f40c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.902000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.923000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.931229 kernel: audit: type=1327 audit(1747443027.902:1543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.931434 kernel: audit: type=1400 audit(1747443027.923:1544): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.931496 kernel: audit: type=1300 audit(1747443027.923:1544): arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0072d3360 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.923000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0072d3360 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.935703 kernel: audit: type=1327 audit(1747443027.923:1544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.923000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:27.943000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.948481 kernel: audit: type=1400 audit(1747443027.943:1545): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:27.943000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00811ff20 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c347 key=(null) May 17 00:50:27.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D32342E3139392E3131372E3637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:50:28.667084 sshd[5200]: pam_unix(sshd:session): session closed for user core May 17 00:50:28.706000 audit[5200]: USER_END pid=5200 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:28.707000 audit[5200]: CRED_DISP pid=5200 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:28.728857 systemd[1]: sshd@21-24.199.117.67:22-147.75.109.163:59174.service: Deactivated successfully. May 17 00:50:28.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-24.199.117.67:22-147.75.109.163:59174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:28.736089 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:50:28.736377 systemd[1]: session-22.scope: Consumed 1.267s CPU time. May 17 00:50:28.740473 systemd-logind[1173]: Session 22 logged out. Waiting for processes to exit. May 17 00:50:28.751418 systemd-logind[1173]: Removed session 22. May 17 00:50:28.779253 kubelet[1950]: E0517 00:50:28.779165 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:50:29.463389 kubelet[1950]: E0517 00:50:29.463320 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:50:30.118000 audit[5213]: NETFILTER_CFG table=filter:129 family=2 entries=24 op=nft_register_rule pid=5213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:30.118000 audit[5213]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffafbab870 a2=0 a3=7fffafbab85c items=0 ppid=2068 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:30.132000 audit[5213]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:30.132000 audit[5213]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffafbab870 a2=0 a3=7fffafbab85c items=0 ppid=2068 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:32.498000 audit[4450]: AVC avc: denied { watch } for pid=4450 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_06.3068264033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c522,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c522,c842 tclass=file permissive=0 May 17 00:50:32.498000 audit[4450]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f4c600 a2=fc6 a3=0 items=0 ppid=3861 pid=4450 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c522,c842 key=(null) May 17 00:50:32.498000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:33.546000 audit[4410]: AVC avc: denied { watch } for pid=4410 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_06.481463891/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c823 tclass=file permissive=0 May 17 00:50:33.553919 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:50:33.558442 kernel: audit: type=1400 audit(1747443033.546:1552): avc: denied { watch } for pid=4410 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_06.481463891/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c823 tclass=file permissive=0 May 17 00:50:33.558954 kernel: audit: type=1300 audit(1747443033.546:1552): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001584b60 a2=fc6 a3=0 items=0 ppid=3915 pid=4410 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 key=(null) May 17 00:50:33.546000 audit[4410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001584b60 a2=fc6 a3=0 items=0 ppid=3915 pid=4410 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c823 key=(null) May 17 00:50:33.546000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:33.564630 kernel: audit: type=1327 audit(1747443033.546:1552): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:33.662624 systemd[1]: Started sshd@22-24.199.117.67:22-147.75.109.163:41786.service. May 17 00:50:33.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-24.199.117.67:22-147.75.109.163:41786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:33.667993 kernel: audit: type=1130 audit(1747443033.662:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-24.199.117.67:22-147.75.109.163:41786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:33.742000 audit[5218]: USER_ACCT pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.744666 sshd[5218]: Accepted publickey for core from 147.75.109.163 port 41786 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:33.747000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.753254 kernel: audit: type=1101 audit(1747443033.742:1554): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.753442 kernel: audit: type=1103 audit(1747443033.747:1555): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.753487 kernel: audit: type=1006 audit(1747443033.747:1556): pid=5218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:50:33.747000 audit[5218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee58da120 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.761058 kernel: audit: type=1300 audit(1747443033.747:1556): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee58da120 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.761394 sshd[5218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:33.747000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:33.764728 kernel: audit: type=1327 audit(1747443033.747:1556): proctitle=737368643A20636F7265205B707269765D May 17 00:50:33.784187 systemd-logind[1173]: New session 23 of user core. May 17 00:50:33.785230 systemd[1]: Started session-23.scope. May 17 00:50:33.793000 audit[5218]: USER_START pid=5218 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.796000 audit[5220]: CRED_ACQ pid=5220 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:33.799882 kernel: audit: type=1105 audit(1747443033.793:1557): pid=5218 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:34.363056 sshd[5218]: pam_unix(sshd:session): session closed for user core May 17 00:50:34.363000 audit[5218]: USER_END pid=5218 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:34.367000 audit[5218]: CRED_DISP pid=5218 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:34.373704 systemd-logind[1173]: Session 23 logged out. Waiting for processes to exit. May 17 00:50:34.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-24.199.117.67:22-147.75.109.163:41786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:34.374565 systemd[1]: sshd@22-24.199.117.67:22-147.75.109.163:41786.service: Deactivated successfully. May 17 00:50:34.377174 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:50:34.380287 systemd-logind[1173]: Removed session 23. May 17 00:50:35.691000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:35.691000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ab420 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:35.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:35.710000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:35.710000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001236c60 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:35.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:35.710000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:35.710000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001237000 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:35.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:35.710000 audit[1802]: AVC avc: denied { watch } for pid=1802 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:35.710000 audit[1802]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ab4e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c947 key=(null) May 17 00:50:35.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:39.371944 systemd[1]: Started sshd@23-24.199.117.67:22-147.75.109.163:43838.service. May 17 00:50:39.376697 kernel: kauditd_printk_skb: 16 callbacks suppressed May 17 00:50:39.376839 kernel: audit: type=1130 audit(1747443039.371:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-24.199.117.67:22-147.75.109.163:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:39.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-24.199.117.67:22-147.75.109.163:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:39.498000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.500416 sshd[5251]: Accepted publickey for core from 147.75.109.163 port 43838 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:39.505627 kernel: audit: type=1101 audit(1747443039.498:1567): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.507000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.517212 kernel: audit: type=1103 audit(1747443039.507:1568): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.517382 kernel: audit: type=1006 audit(1747443039.507:1569): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:50:39.518771 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:39.507000 audit[5251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b6ccc00 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.529039 kernel: audit: type=1300 audit(1747443039.507:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b6ccc00 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.507000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:39.531961 kernel: audit: type=1327 audit(1747443039.507:1569): proctitle=737368643A20636F7265205B707269765D May 17 00:50:39.536290 systemd-logind[1173]: New session 24 of user core. May 17 00:50:39.538403 systemd[1]: Started session-24.scope. May 17 00:50:39.556000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.563636 kernel: audit: type=1105 audit(1747443039.556:1570): pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.566000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:39.574706 kernel: audit: type=1103 audit(1747443039.566:1571): pid=5262 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:40.175864 sshd[5251]: pam_unix(sshd:session): session closed for user core May 17 00:50:40.176000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:40.180081 systemd[1]: sshd@23-24.199.117.67:22-147.75.109.163:43838.service: Deactivated successfully. May 17 00:50:40.188199 kernel: audit: type=1106 audit(1747443040.176:1572): pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:40.188324 kernel: audit: type=1104 audit(1747443040.176:1573): pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:40.176000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:40.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-24.199.117.67:22-147.75.109.163:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.181773 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:50:40.187580 systemd-logind[1173]: Session 24 logged out. Waiting for processes to exit. May 17 00:50:40.191069 systemd-logind[1173]: Removed session 24. May 17 00:50:41.676217 kubelet[1950]: E0517 00:50:41.676149 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:50:41.702861 env[1186]: time="2025-05-17T00:50:41.702453740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:50:41.945761 env[1186]: time="2025-05-17T00:50:41.945546271Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:41.946607 env[1186]: time="2025-05-17T00:50:41.946517007Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:41.950030 kubelet[1950]: E0517 00:50:41.949914 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:41.950542 kubelet[1950]: E0517 00:50:41.950060 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:41.969212 kubelet[1950]: E0517 00:50:41.969085 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5cz4l,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-qvcxd_calico-system(e695e6ca-70af-4c0a-aa8b-bbd459269076): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:41.998040 kubelet[1950]: E0517 00:50:41.997924 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:50:42.463174 kubelet[1950]: E0517 00:50:42.463121 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 17 00:50:43.462518 env[1186]: time="2025-05-17T00:50:43.462113812Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:50:43.690121 env[1186]: time="2025-05-17T00:50:43.689797594Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:43.691496 env[1186]: time="2025-05-17T00:50:43.691280919Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:43.692860 kubelet[1950]: E0517 00:50:43.691846 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:43.692860 kubelet[1950]: E0517 00:50:43.691919 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:43.692860 kubelet[1950]: E0517 00:50:43.692109 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ec5b00b99e7c48b0837097a3f87732db,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:43.696568 env[1186]: time="2025-05-17T00:50:43.696104268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:50:43.987982 env[1186]: time="2025-05-17T00:50:43.987862785Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:43.989061 env[1186]: time="2025-05-17T00:50:43.988979546Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:43.989422 kubelet[1950]: E0517 00:50:43.989353 1950 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:43.989633 kubelet[1950]: E0517 00:50:43.989600 1950 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:43.990506 kubelet[1950]: E0517 00:50:43.990442 1950 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xvpjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-769dd55968-l5tmw_calico-system(ae796357-26e6-4919-9e04-f9f1860c2cb8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:43.992133 kubelet[1950]: E0517 00:50:43.992004 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8" May 17 00:50:45.197736 systemd[1]: Started sshd@24-24.199.117.67:22-147.75.109.163:43844.service. May 17 00:50:45.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-24.199.117.67:22-147.75.109.163:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.207379 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:45.207542 kernel: audit: type=1130 audit(1747443045.198:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-24.199.117.67:22-147.75.109.163:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.357000 audit[5284]: USER_ACCT pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.365563 kernel: audit: type=1101 audit(1747443045.357:1576): pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.365712 sshd[5284]: Accepted publickey for core from 147.75.109.163 port 43844 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:45.365000 audit[5284]: CRED_ACQ pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.375314 kernel: audit: type=1103 audit(1747443045.365:1577): pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.375521 kernel: audit: type=1006 audit(1747443045.366:1578): pid=5284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:50:45.380863 kernel: audit: type=1300 audit(1747443045.366:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff7a17d0 a2=3 a3=0 items=0 ppid=1 pid=5284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.366000 audit[5284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff7a17d0 a2=3 a3=0 items=0 ppid=1 pid=5284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.388472 kernel: audit: type=1327 audit(1747443045.366:1578): proctitle=737368643A20636F7265205B707269765D May 17 00:50:45.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:45.387496 sshd[5284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:45.398067 systemd-logind[1173]: New session 25 of user core. May 17 00:50:45.399291 systemd[1]: Started session-25.scope. May 17 00:50:45.410000 audit[5284]: USER_START pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.417929 kernel: audit: type=1105 audit(1747443045.410:1579): pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.418000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.425698 kernel: audit: type=1103 audit(1747443045.418:1580): pid=5286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:46.003548 sshd[5284]: pam_unix(sshd:session): session closed for user core May 17 00:50:46.005000 audit[5284]: USER_END pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:46.014651 kernel: audit: type=1106 audit(1747443046.005:1581): pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:46.014840 kernel: audit: type=1104 audit(1747443046.005:1582): pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:46.005000 audit[5284]: CRED_DISP pid=5284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:46.012748 systemd[1]: sshd@24-24.199.117.67:22-147.75.109.163:43844.service: Deactivated successfully. May 17 00:50:46.014206 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:50:46.019556 systemd-logind[1173]: Session 25 logged out. Waiting for processes to exit. May 17 00:50:46.021619 systemd-logind[1173]: Removed session 25. May 17 00:50:46.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-24.199.117.67:22-147.75.109.163:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:51.013810 systemd[1]: Started sshd@25-24.199.117.67:22-147.75.109.163:52742.service. May 17 00:50:51.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-24.199.117.67:22-147.75.109.163:52742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:51.019650 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:51.019821 kernel: audit: type=1130 audit(1747443051.016:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-24.199.117.67:22-147.75.109.163:52742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:51.094519 sshd[5304]: Accepted publickey for core from 147.75.109.163 port 52742 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:51.092000 audit[5304]: USER_ACCT pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.099631 kernel: audit: type=1101 audit(1747443051.092:1585): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.100691 sshd[5304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:51.098000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.105686 kernel: audit: type=1103 audit(1747443051.098:1586): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.114523 systemd-logind[1173]: New session 26 of user core. May 17 00:50:51.127143 kernel: audit: type=1006 audit(1747443051.098:1587): pid=5304 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:50:51.127429 systemd[1]: Started session-26.scope. May 17 00:50:51.133824 kernel: audit: type=1300 audit(1747443051.098:1587): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeafa4d330 a2=3 a3=0 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:51.098000 audit[5304]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeafa4d330 a2=3 a3=0 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:51.098000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:51.145691 kernel: audit: type=1327 audit(1747443051.098:1587): proctitle=737368643A20636F7265205B707269765D May 17 00:50:51.145877 kernel: audit: type=1105 audit(1747443051.135:1588): pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.135000 audit[5304]: USER_START pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.139000 audit[5306]: CRED_ACQ pid=5306 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.151709 kernel: audit: type=1103 audit(1747443051.139:1589): pid=5306 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.420358 sshd[5304]: pam_unix(sshd:session): session closed for user core May 17 00:50:51.420000 audit[5304]: USER_END pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.426239 systemd-logind[1173]: Session 26 logged out. Waiting for processes to exit. May 17 00:50:51.421000 audit[5304]: CRED_DISP pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.430001 kernel: audit: type=1106 audit(1747443051.420:1590): pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.430454 kernel: audit: type=1104 audit(1747443051.421:1591): pid=5304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:51.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-24.199.117.67:22-147.75.109.163:52742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:51.428335 systemd[1]: sshd@25-24.199.117.67:22-147.75.109.163:52742.service: Deactivated successfully. May 17 00:50:51.429525 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:50:51.432378 systemd-logind[1173]: Removed session 26. May 17 00:50:56.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-24.199.117.67:22-147.75.109.163:52744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:56.432498 systemd[1]: Started sshd@26-24.199.117.67:22-147.75.109.163:52744.service. May 17 00:50:56.435523 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:56.435631 kernel: audit: type=1130 audit(1747443056.431:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-24.199.117.67:22-147.75.109.163:52744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:56.471116 kubelet[1950]: E0517 00:50:56.471056 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-qvcxd" podUID="e695e6ca-70af-4c0a-aa8b-bbd459269076" May 17 00:50:56.602000 audit[5316]: USER_ACCT pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.605910 sshd[5316]: Accepted publickey for core from 147.75.109.163 port 52744 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:50:56.606000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.612113 sshd[5316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:56.612581 kernel: audit: type=1101 audit(1747443056.602:1594): pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.612656 kernel: audit: type=1103 audit(1747443056.606:1595): pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.608000 audit[5316]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc44bfcb80 a2=3 a3=0 items=0 ppid=1 pid=5316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:56.621077 kernel: audit: type=1006 audit(1747443056.608:1596): pid=5316 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:50:56.621211 kernel: audit: type=1300 audit(1747443056.608:1596): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc44bfcb80 a2=3 a3=0 items=0 ppid=1 pid=5316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:56.621649 kernel: audit: type=1327 audit(1747443056.608:1596): proctitle=737368643A20636F7265205B707269765D May 17 00:50:56.608000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:56.628469 systemd[1]: Started session-27.scope. May 17 00:50:56.629215 systemd-logind[1173]: New session 27 of user core. May 17 00:50:56.640000 audit[5316]: USER_START pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.647676 kernel: audit: type=1105 audit(1747443056.640:1597): pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.647000 audit[5318]: CRED_ACQ pid=5318 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:56.654652 kernel: audit: type=1103 audit(1747443056.647:1598): pid=5318 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:57.049401 sshd[5316]: pam_unix(sshd:session): session closed for user core May 17 00:50:57.050000 audit[5316]: USER_END pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:57.057263 kernel: audit: type=1106 audit(1747443057.050:1599): pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:57.057438 kernel: audit: type=1104 audit(1747443057.050:1600): pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:57.050000 audit[5316]: CRED_DISP pid=5316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:57.055665 systemd[1]: sshd@26-24.199.117.67:22-147.75.109.163:52744.service: Deactivated successfully. May 17 00:50:57.056698 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:50:57.060932 systemd-logind[1173]: Session 27 logged out. Waiting for processes to exit. May 17 00:50:57.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-24.199.117.67:22-147.75.109.163:52744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:57.062665 systemd-logind[1173]: Removed session 27. May 17 00:50:59.466832 kubelet[1950]: E0517 00:50:59.466736 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-769dd55968-l5tmw" podUID="ae796357-26e6-4919-9e04-f9f1860c2cb8"