May 17 00:42:45.961131 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:42:45.961162 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:45.961176 kernel: BIOS-provided physical RAM map: May 17 00:42:45.961183 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:42:45.961190 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:42:45.961200 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:42:45.961213 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 17 00:42:45.961224 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 17 00:42:45.961236 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:42:45.961242 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:42:45.961249 kernel: NX (Execute Disable) protection: active May 17 00:42:45.961256 kernel: SMBIOS 2.8 present. May 17 00:42:45.961262 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 17 00:42:45.961269 kernel: Hypervisor detected: KVM May 17 00:42:45.961277 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:42:45.961323 kernel: kvm-clock: cpu 0, msr 2f19a001, primary cpu clock May 17 00:42:45.968353 kernel: kvm-clock: using sched offset of 3160024873 cycles May 17 00:42:45.968366 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:42:45.968381 kernel: tsc: Detected 2494.140 MHz processor May 17 00:42:45.968389 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:42:45.968398 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:42:45.968406 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 17 00:42:45.968414 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:42:45.968433 kernel: ACPI: Early table checksum verification disabled May 17 00:42:45.968440 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 17 00:42:45.968448 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968455 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968463 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968471 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 17 00:42:45.968478 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968485 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968493 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968504 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:45.968512 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 17 00:42:45.968520 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 17 00:42:45.968527 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 17 00:42:45.968534 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 17 00:42:45.968541 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 17 00:42:45.968549 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 17 00:42:45.968557 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 17 00:42:45.968572 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:42:45.968580 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:42:45.968588 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:42:45.968596 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:42:45.968604 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 17 00:42:45.968612 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 17 00:42:45.968623 kernel: Zone ranges: May 17 00:42:45.968632 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:42:45.968639 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 17 00:42:45.968647 kernel: Normal empty May 17 00:42:45.968655 kernel: Movable zone start for each node May 17 00:42:45.968664 kernel: Early memory node ranges May 17 00:42:45.968672 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:42:45.968680 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 17 00:42:45.968687 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 17 00:42:45.968698 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:42:45.968709 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:42:45.968718 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 17 00:42:45.968726 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:42:45.968734 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:42:45.968742 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:42:45.968750 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:42:45.968758 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:42:45.968766 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:42:45.968778 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:42:45.968787 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:42:45.968796 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:42:45.968804 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:42:45.968811 kernel: TSC deadline timer available May 17 00:42:45.968819 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:42:45.968828 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 17 00:42:45.968836 kernel: Booting paravirtualized kernel on KVM May 17 00:42:45.968844 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:42:45.968855 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:42:45.968864 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:42:45.968872 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:42:45.968879 kernel: pcpu-alloc: [0] 0 1 May 17 00:42:45.968887 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 17 00:42:45.968895 kernel: kvm-guest: PV spinlocks disabled, no host support May 17 00:42:45.968903 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 17 00:42:45.968910 kernel: Policy zone: DMA32 May 17 00:42:45.968920 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:45.968933 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:42:45.968940 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:42:45.968948 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:42:45.968956 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:42:45.968964 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 123076K reserved, 0K cma-reserved) May 17 00:42:45.968973 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:42:45.968980 kernel: Kernel/User page tables isolation: enabled May 17 00:42:45.968988 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:42:45.969000 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:42:45.969007 kernel: rcu: Hierarchical RCU implementation. May 17 00:42:45.969016 kernel: rcu: RCU event tracing is enabled. May 17 00:42:45.969024 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:42:45.969032 kernel: Rude variant of Tasks RCU enabled. May 17 00:42:45.969040 kernel: Tracing variant of Tasks RCU enabled. May 17 00:42:45.969048 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:42:45.969057 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:42:45.969065 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:42:45.969076 kernel: random: crng init done May 17 00:42:45.969083 kernel: Console: colour VGA+ 80x25 May 17 00:42:45.969091 kernel: printk: console [tty0] enabled May 17 00:42:45.969100 kernel: printk: console [ttyS0] enabled May 17 00:42:45.969107 kernel: ACPI: Core revision 20210730 May 17 00:42:45.969115 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:42:45.969123 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:42:45.969131 kernel: x2apic enabled May 17 00:42:45.969139 kernel: Switched APIC routing to physical x2apic. May 17 00:42:45.969147 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:42:45.969158 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 17 00:42:45.969166 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) May 17 00:42:45.969179 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 17 00:42:45.969187 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 17 00:42:45.969195 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:42:45.969203 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:42:45.969211 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:42:45.969219 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 17 00:42:45.969231 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:42:45.969251 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:42:45.969259 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:42:45.969271 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:42:45.969279 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:42:45.969310 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:42:45.969319 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:42:45.969327 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:42:45.969336 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:42:45.969345 kernel: Freeing SMP alternatives memory: 32K May 17 00:42:45.969357 kernel: pid_max: default: 32768 minimum: 301 May 17 00:42:45.969366 kernel: LSM: Security Framework initializing May 17 00:42:45.969375 kernel: SELinux: Initializing. May 17 00:42:45.969384 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:42:45.969392 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:42:45.969401 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 17 00:42:45.969409 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 17 00:42:45.969421 kernel: signal: max sigframe size: 1776 May 17 00:42:45.969429 kernel: rcu: Hierarchical SRCU implementation. May 17 00:42:45.969438 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:42:45.969446 kernel: smp: Bringing up secondary CPUs ... May 17 00:42:45.969455 kernel: x86: Booting SMP configuration: May 17 00:42:45.969463 kernel: .... node #0, CPUs: #1 May 17 00:42:45.969471 kernel: kvm-clock: cpu 1, msr 2f19a041, secondary cpu clock May 17 00:42:45.969480 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 17 00:42:45.969488 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:42:45.969499 kernel: smpboot: Max logical packages: 1 May 17 00:42:45.969508 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) May 17 00:42:45.969516 kernel: devtmpfs: initialized May 17 00:42:45.969525 kernel: x86/mm: Memory block size: 128MB May 17 00:42:45.969533 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:42:45.969542 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:42:45.969550 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:42:45.969559 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:42:45.969568 kernel: audit: initializing netlink subsys (disabled) May 17 00:42:45.969579 kernel: audit: type=2000 audit(1747442564.506:1): state=initialized audit_enabled=0 res=1 May 17 00:42:45.969588 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:42:45.969597 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:42:45.969606 kernel: cpuidle: using governor menu May 17 00:42:45.969615 kernel: ACPI: bus type PCI registered May 17 00:42:45.969623 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:42:45.969635 kernel: dca service started, version 1.12.1 May 17 00:42:45.969643 kernel: PCI: Using configuration type 1 for base access May 17 00:42:45.969652 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:42:45.969664 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:42:45.969672 kernel: ACPI: Added _OSI(Module Device) May 17 00:42:45.969680 kernel: ACPI: Added _OSI(Processor Device) May 17 00:42:45.969689 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:42:45.969697 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:42:45.969705 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:42:45.969714 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:42:45.969722 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:42:45.969730 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:42:45.969742 kernel: ACPI: Interpreter enabled May 17 00:42:45.969750 kernel: ACPI: PM: (supports S0 S5) May 17 00:42:45.969759 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:42:45.969767 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:42:45.969776 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:42:45.969784 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:42:45.970039 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:42:45.970136 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:42:45.970152 kernel: acpiphp: Slot [3] registered May 17 00:42:45.970161 kernel: acpiphp: Slot [4] registered May 17 00:42:45.970169 kernel: acpiphp: Slot [5] registered May 17 00:42:45.970178 kernel: acpiphp: Slot [6] registered May 17 00:42:45.970186 kernel: acpiphp: Slot [7] registered May 17 00:42:45.970195 kernel: acpiphp: Slot [8] registered May 17 00:42:45.970203 kernel: acpiphp: Slot [9] registered May 17 00:42:45.970213 kernel: acpiphp: Slot [10] registered May 17 00:42:45.970221 kernel: acpiphp: Slot [11] registered May 17 00:42:45.970233 kernel: acpiphp: Slot [12] registered May 17 00:42:45.970242 kernel: acpiphp: Slot [13] registered May 17 00:42:45.970251 kernel: acpiphp: Slot [14] registered May 17 00:42:45.970259 kernel: acpiphp: Slot [15] registered May 17 00:42:45.970267 kernel: acpiphp: Slot [16] registered May 17 00:42:45.970276 kernel: acpiphp: Slot [17] registered May 17 00:42:45.970296 kernel: acpiphp: Slot [18] registered May 17 00:42:45.970304 kernel: acpiphp: Slot [19] registered May 17 00:42:45.970313 kernel: acpiphp: Slot [20] registered May 17 00:42:45.970326 kernel: acpiphp: Slot [21] registered May 17 00:42:45.970334 kernel: acpiphp: Slot [22] registered May 17 00:42:45.970342 kernel: acpiphp: Slot [23] registered May 17 00:42:45.970351 kernel: acpiphp: Slot [24] registered May 17 00:42:45.970359 kernel: acpiphp: Slot [25] registered May 17 00:42:45.970368 kernel: acpiphp: Slot [26] registered May 17 00:42:45.970376 kernel: acpiphp: Slot [27] registered May 17 00:42:45.970385 kernel: acpiphp: Slot [28] registered May 17 00:42:45.970394 kernel: acpiphp: Slot [29] registered May 17 00:42:45.970402 kernel: acpiphp: Slot [30] registered May 17 00:42:45.970414 kernel: acpiphp: Slot [31] registered May 17 00:42:45.970424 kernel: PCI host bridge to bus 0000:00 May 17 00:42:45.970533 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:42:45.970618 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:42:45.970715 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:42:45.970824 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:42:45.970931 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 17 00:42:45.971026 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:42:45.971153 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:42:45.971264 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:42:45.971397 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 17 00:42:45.971495 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 17 00:42:45.971590 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:42:45.971684 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:42:45.971779 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:42:45.971871 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:42:45.971984 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 17 00:42:45.972077 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 17 00:42:45.972273 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:42:45.972442 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 17 00:42:45.972584 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 17 00:42:45.972699 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 17 00:42:45.972793 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 17 00:42:45.972892 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 17 00:42:45.972980 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 17 00:42:45.973067 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 17 00:42:45.973160 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:42:45.973262 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 17 00:42:45.973395 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 17 00:42:45.973486 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 17 00:42:45.973631 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 17 00:42:45.974332 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:42:45.974438 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 17 00:42:45.974539 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 17 00:42:45.974634 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 17 00:42:45.974744 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 17 00:42:45.974839 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 17 00:42:45.974958 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 17 00:42:45.975073 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 17 00:42:45.975188 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 17 00:42:45.976365 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:42:45.976501 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 17 00:42:45.976590 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 17 00:42:45.976695 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 17 00:42:45.976783 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 17 00:42:45.976868 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 17 00:42:45.976955 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 17 00:42:45.977056 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 17 00:42:45.977142 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 17 00:42:45.977228 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 17 00:42:45.977239 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:42:45.977248 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:42:45.977257 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:42:45.977266 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:42:45.977278 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:42:45.977296 kernel: iommu: Default domain type: Translated May 17 00:42:45.977304 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:42:45.977393 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 17 00:42:45.977479 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:42:45.977565 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 17 00:42:45.977576 kernel: vgaarb: loaded May 17 00:42:45.977585 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:42:45.977594 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:42:45.977606 kernel: PTP clock support registered May 17 00:42:45.977615 kernel: PCI: Using ACPI for IRQ routing May 17 00:42:45.977624 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:42:45.977633 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:42:45.977642 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 17 00:42:45.977650 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:42:45.977659 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:42:45.977668 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:42:45.977676 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:42:45.977689 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:42:45.977698 kernel: pnp: PnP ACPI init May 17 00:42:45.977706 kernel: pnp: PnP ACPI: found 4 devices May 17 00:42:45.977715 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:42:45.977724 kernel: NET: Registered PF_INET protocol family May 17 00:42:45.977732 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:42:45.977741 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:42:45.977750 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:42:45.977763 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:42:45.977771 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:42:45.977780 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:42:45.977788 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:42:45.977797 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:42:45.977806 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:42:45.977814 kernel: NET: Registered PF_XDP protocol family May 17 00:42:45.977904 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:42:45.977983 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:42:45.978064 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:42:45.978140 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:42:45.978217 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 17 00:42:45.980370 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 17 00:42:45.980498 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:42:45.980590 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:42:45.980604 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:42:45.980694 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 31930 usecs May 17 00:42:45.980712 kernel: PCI: CLS 0 bytes, default 64 May 17 00:42:45.980722 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:42:45.980731 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 17 00:42:45.980740 kernel: Initialise system trusted keyrings May 17 00:42:45.980749 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:42:45.980758 kernel: Key type asymmetric registered May 17 00:42:45.980767 kernel: Asymmetric key parser 'x509' registered May 17 00:42:45.980775 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:42:45.980784 kernel: io scheduler mq-deadline registered May 17 00:42:45.980797 kernel: io scheduler kyber registered May 17 00:42:45.980806 kernel: io scheduler bfq registered May 17 00:42:45.980814 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:42:45.980823 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 17 00:42:45.980832 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:42:45.980844 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:42:45.980858 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:42:45.980870 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:42:45.980881 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:42:45.980898 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:42:45.980910 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:42:45.980921 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:42:45.981107 kernel: rtc_cmos 00:03: RTC can wake from S4 May 17 00:42:45.981196 kernel: rtc_cmos 00:03: registered as rtc0 May 17 00:42:45.981278 kernel: rtc_cmos 00:03: setting system clock to 2025-05-17T00:42:45 UTC (1747442565) May 17 00:42:45.983473 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 17 00:42:45.983496 kernel: intel_pstate: CPU model not supported May 17 00:42:45.983506 kernel: NET: Registered PF_INET6 protocol family May 17 00:42:45.983514 kernel: Segment Routing with IPv6 May 17 00:42:45.983523 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:42:45.983532 kernel: NET: Registered PF_PACKET protocol family May 17 00:42:45.983541 kernel: Key type dns_resolver registered May 17 00:42:45.983550 kernel: IPI shorthand broadcast: enabled May 17 00:42:45.983559 kernel: sched_clock: Marking stable (656581212, 111534110)->(903070277, -134954955) May 17 00:42:45.983568 kernel: registered taskstats version 1 May 17 00:42:45.983576 kernel: Loading compiled-in X.509 certificates May 17 00:42:45.983589 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:42:45.983597 kernel: Key type .fscrypt registered May 17 00:42:45.983606 kernel: Key type fscrypt-provisioning registered May 17 00:42:45.983615 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:42:45.983623 kernel: ima: Allocated hash algorithm: sha1 May 17 00:42:45.983632 kernel: ima: No architecture policies found May 17 00:42:45.983640 kernel: clk: Disabling unused clocks May 17 00:42:45.983649 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:42:45.983662 kernel: Write protecting the kernel read-only data: 28672k May 17 00:42:45.983670 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:42:45.983686 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:42:45.983695 kernel: Run /init as init process May 17 00:42:45.983704 kernel: with arguments: May 17 00:42:45.983713 kernel: /init May 17 00:42:45.983755 kernel: with environment: May 17 00:42:45.983768 kernel: HOME=/ May 17 00:42:45.983777 kernel: TERM=linux May 17 00:42:45.983785 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:42:45.983802 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:42:45.983814 systemd[1]: Detected virtualization kvm. May 17 00:42:45.983824 systemd[1]: Detected architecture x86-64. May 17 00:42:45.983840 systemd[1]: Running in initrd. May 17 00:42:45.983849 systemd[1]: No hostname configured, using default hostname. May 17 00:42:45.983858 systemd[1]: Hostname set to . May 17 00:42:45.983872 systemd[1]: Initializing machine ID from VM UUID. May 17 00:42:45.983881 systemd[1]: Queued start job for default target initrd.target. May 17 00:42:45.983891 systemd[1]: Started systemd-ask-password-console.path. May 17 00:42:45.983900 systemd[1]: Reached target cryptsetup.target. May 17 00:42:45.983915 systemd[1]: Reached target paths.target. May 17 00:42:45.983925 systemd[1]: Reached target slices.target. May 17 00:42:45.983934 systemd[1]: Reached target swap.target. May 17 00:42:45.983943 systemd[1]: Reached target timers.target. May 17 00:42:45.983964 systemd[1]: Listening on iscsid.socket. May 17 00:42:45.983974 systemd[1]: Listening on iscsiuio.socket. May 17 00:42:45.983989 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:42:45.983999 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:42:45.984008 systemd[1]: Listening on systemd-journald.socket. May 17 00:42:45.984018 systemd[1]: Listening on systemd-networkd.socket. May 17 00:42:45.984027 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:42:45.984047 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:42:45.984056 systemd[1]: Reached target sockets.target. May 17 00:42:45.984068 systemd[1]: Starting kmod-static-nodes.service... May 17 00:42:45.984085 systemd[1]: Finished network-cleanup.service. May 17 00:42:45.984097 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:42:45.984107 systemd[1]: Starting systemd-journald.service... May 17 00:42:45.984123 systemd[1]: Starting systemd-modules-load.service... May 17 00:42:45.984136 systemd[1]: Starting systemd-resolved.service... May 17 00:42:45.984145 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:42:45.984155 systemd[1]: Finished kmod-static-nodes.service. May 17 00:42:45.984171 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:42:45.984188 systemd-journald[184]: Journal started May 17 00:42:45.984320 systemd-journald[184]: Runtime Journal (/run/log/journal/cf15f39f6b0c4f9b93134d8b534123ad) is 4.9M, max 39.5M, 34.5M free. May 17 00:42:45.975532 systemd-modules-load[185]: Inserted module 'overlay' May 17 00:42:45.996217 systemd[1]: Started systemd-journald.service. May 17 00:42:45.996326 kernel: audit: type=1130 audit(1747442565.992:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:45.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.003106 systemd-resolved[186]: Positive Trust Anchors: May 17 00:42:46.003133 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:42:46.003186 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:42:46.011595 kernel: audit: type=1130 audit(1747442566.003:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.005472 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:42:46.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.013072 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:42:46.017635 kernel: audit: type=1130 audit(1747442566.013:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.014730 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:42:46.015901 systemd-resolved[186]: Defaulting to hostname 'linux'. May 17 00:42:46.019650 systemd[1]: Started systemd-resolved.service. May 17 00:42:46.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.021075 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:42:46.027008 kernel: audit: type=1130 audit(1747442566.020:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.030856 systemd[1]: Reached target nss-lookup.target. May 17 00:42:46.035436 kernel: audit: type=1130 audit(1747442566.030:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.040338 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:42:46.040356 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:42:46.046230 kernel: audit: type=1130 audit(1747442566.041:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.042828 systemd[1]: Starting dracut-cmdline.service... May 17 00:42:46.051153 systemd-modules-load[185]: Inserted module 'br_netfilter' May 17 00:42:46.051713 kernel: Bridge firewalling registered May 17 00:42:46.061850 dracut-cmdline[201]: dracut-dracut-053 May 17 00:42:46.064516 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:46.077331 kernel: SCSI subsystem initialized May 17 00:42:46.094450 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:42:46.094565 kernel: device-mapper: uevent: version 1.0.3 May 17 00:42:46.094586 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:42:46.106022 systemd-modules-load[185]: Inserted module 'dm_multipath' May 17 00:42:46.107150 systemd[1]: Finished systemd-modules-load.service. May 17 00:42:46.108794 systemd[1]: Starting systemd-sysctl.service... May 17 00:42:46.114718 kernel: audit: type=1130 audit(1747442566.107:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.121203 systemd[1]: Finished systemd-sysctl.service. May 17 00:42:46.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.124312 kernel: audit: type=1130 audit(1747442566.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.171335 kernel: Loading iSCSI transport class v2.0-870. May 17 00:42:46.198319 kernel: iscsi: registered transport (tcp) May 17 00:42:46.228343 kernel: iscsi: registered transport (qla4xxx) May 17 00:42:46.228472 kernel: QLogic iSCSI HBA Driver May 17 00:42:46.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.273431 systemd[1]: Finished dracut-cmdline.service. May 17 00:42:46.279797 kernel: audit: type=1130 audit(1747442566.273:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.275587 systemd[1]: Starting dracut-pre-udev.service... May 17 00:42:46.332367 kernel: raid6: avx2x4 gen() 20693 MB/s May 17 00:42:46.349355 kernel: raid6: avx2x4 xor() 7825 MB/s May 17 00:42:46.366356 kernel: raid6: avx2x2 gen() 22022 MB/s May 17 00:42:46.383356 kernel: raid6: avx2x2 xor() 16701 MB/s May 17 00:42:46.400362 kernel: raid6: avx2x1 gen() 19718 MB/s May 17 00:42:46.417359 kernel: raid6: avx2x1 xor() 16100 MB/s May 17 00:42:46.434362 kernel: raid6: sse2x4 gen() 9999 MB/s May 17 00:42:46.451360 kernel: raid6: sse2x4 xor() 6153 MB/s May 17 00:42:46.468361 kernel: raid6: sse2x2 gen() 10280 MB/s May 17 00:42:46.485899 kernel: raid6: sse2x2 xor() 8625 MB/s May 17 00:42:46.502366 kernel: raid6: sse2x1 gen() 9732 MB/s May 17 00:42:46.519638 kernel: raid6: sse2x1 xor() 5633 MB/s May 17 00:42:46.519767 kernel: raid6: using algorithm avx2x2 gen() 22022 MB/s May 17 00:42:46.519782 kernel: raid6: .... xor() 16701 MB/s, rmw enabled May 17 00:42:46.520710 kernel: raid6: using avx2x2 recovery algorithm May 17 00:42:46.534342 kernel: xor: automatically using best checksumming function avx May 17 00:42:46.664353 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:42:46.679383 systemd[1]: Finished dracut-pre-udev.service. May 17 00:42:46.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.680000 audit: BPF prog-id=7 op=LOAD May 17 00:42:46.680000 audit: BPF prog-id=8 op=LOAD May 17 00:42:46.681545 systemd[1]: Starting systemd-udevd.service... May 17 00:42:46.698587 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:42:46.705578 systemd[1]: Started systemd-udevd.service. May 17 00:42:46.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.707459 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:42:46.726050 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation May 17 00:42:46.772689 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:42:46.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.774341 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:42:46.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:46.850015 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:42:46.932935 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 17 00:42:46.991546 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:42:46.991572 kernel: scsi host0: Virtio SCSI HBA May 17 00:42:46.991745 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:42:46.991758 kernel: GPT:9289727 != 125829119 May 17 00:42:46.991769 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:42:46.991779 kernel: GPT:9289727 != 125829119 May 17 00:42:46.991790 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:42:46.991801 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:46.991815 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:42:46.991826 kernel: AES CTR mode by8 optimization enabled May 17 00:42:46.994455 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 17 00:42:47.014322 kernel: libata version 3.00 loaded. May 17 00:42:47.020348 kernel: ata_piix 0000:00:01.1: version 2.13 May 17 00:42:47.028652 kernel: scsi host1: ata_piix May 17 00:42:47.028863 kernel: scsi host2: ata_piix May 17 00:42:47.028996 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 17 00:42:47.029010 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 17 00:42:47.045626 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:42:47.095891 kernel: ACPI: bus type USB registered May 17 00:42:47.095924 kernel: usbcore: registered new interface driver usbfs May 17 00:42:47.095936 kernel: usbcore: registered new interface driver hub May 17 00:42:47.095948 kernel: usbcore: registered new device driver usb May 17 00:42:47.095959 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (436) May 17 00:42:47.099994 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:42:47.108964 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:42:47.110358 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:42:47.118139 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:42:47.122878 systemd[1]: Starting disk-uuid.service... May 17 00:42:47.130866 disk-uuid[505]: Primary Header is updated. May 17 00:42:47.130866 disk-uuid[505]: Secondary Entries is updated. May 17 00:42:47.130866 disk-uuid[505]: Secondary Header is updated. May 17 00:42:47.146335 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:47.153327 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:47.212138 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 17 00:42:47.228313 kernel: ehci-pci: EHCI PCI platform driver May 17 00:42:47.233315 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 17 00:42:47.258756 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 17 00:42:47.263516 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 17 00:42:47.263674 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 17 00:42:47.263782 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 17 00:42:47.263910 kernel: hub 1-0:1.0: USB hub found May 17 00:42:47.264052 kernel: hub 1-0:1.0: 2 ports detected May 17 00:42:48.158343 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:48.158749 disk-uuid[506]: The operation has completed successfully. May 17 00:42:48.216008 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:42:48.216122 systemd[1]: Finished disk-uuid.service. May 17 00:42:48.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.217594 systemd[1]: Starting verity-setup.service... May 17 00:42:48.236326 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:42:48.294136 systemd[1]: Found device dev-mapper-usr.device. May 17 00:42:48.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.296420 systemd[1]: Mounting sysusr-usr.mount... May 17 00:42:48.297056 systemd[1]: Finished verity-setup.service. May 17 00:42:48.389614 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:42:48.390126 systemd[1]: Mounted sysusr-usr.mount. May 17 00:42:48.390757 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:42:48.391659 systemd[1]: Starting ignition-setup.service... May 17 00:42:48.393132 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:42:48.412140 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:42:48.412299 kernel: BTRFS info (device vda6): using free space tree May 17 00:42:48.412318 kernel: BTRFS info (device vda6): has skinny extents May 17 00:42:48.434262 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:42:48.445016 systemd[1]: Finished ignition-setup.service. May 17 00:42:48.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.446570 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:42:48.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.556477 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:42:48.557000 audit: BPF prog-id=9 op=LOAD May 17 00:42:48.558710 systemd[1]: Starting systemd-networkd.service... May 17 00:42:48.581332 ignition[618]: Ignition 2.14.0 May 17 00:42:48.581348 ignition[618]: Stage: fetch-offline May 17 00:42:48.581434 ignition[618]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:48.581472 ignition[618]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:48.585636 ignition[618]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:48.585792 ignition[618]: parsed url from cmdline: "" May 17 00:42:48.585797 ignition[618]: no config URL provided May 17 00:42:48.585803 ignition[618]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:42:48.585812 ignition[618]: no config at "/usr/lib/ignition/user.ign" May 17 00:42:48.585818 ignition[618]: failed to fetch config: resource requires networking May 17 00:42:48.585961 ignition[618]: Ignition finished successfully May 17 00:42:48.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.589064 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:42:48.592842 systemd-networkd[690]: lo: Link UP May 17 00:42:48.593451 systemd-networkd[690]: lo: Gained carrier May 17 00:42:48.594450 systemd-networkd[690]: Enumeration completed May 17 00:42:48.594993 systemd[1]: Started systemd-networkd.service. May 17 00:42:48.595726 systemd-networkd[690]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:42:48.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.595946 systemd[1]: Reached target network.target. May 17 00:42:48.597622 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 17 00:42:48.598405 systemd[1]: Starting ignition-fetch.service... May 17 00:42:48.599946 systemd-networkd[690]: eth1: Link UP May 17 00:42:48.600646 systemd[1]: Starting iscsiuio.service... May 17 00:42:48.607497 systemd-networkd[690]: eth1: Gained carrier May 17 00:42:48.615726 systemd-networkd[690]: eth0: Link UP May 17 00:42:48.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.615732 systemd-networkd[690]: eth0: Gained carrier May 17 00:42:48.620171 systemd[1]: Started iscsiuio.service. May 17 00:42:48.621780 systemd[1]: Starting iscsid.service... May 17 00:42:48.627963 iscsid[701]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:42:48.627963 iscsid[701]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:42:48.627963 iscsid[701]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:42:48.627963 iscsid[701]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:42:48.627963 iscsid[701]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:42:48.627963 iscsid[701]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:42:48.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.631436 systemd[1]: Started iscsid.service. May 17 00:42:48.631504 ignition[693]: Ignition 2.14.0 May 17 00:42:48.632424 systemd-networkd[690]: eth0: DHCPv4 address 134.199.236.151/20, gateway 134.199.224.1 acquired from 169.254.169.253 May 17 00:42:48.631511 ignition[693]: Stage: fetch May 17 00:42:48.634340 systemd[1]: Starting dracut-initqueue.service... May 17 00:42:48.631679 ignition[693]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:48.631700 ignition[693]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:48.640847 ignition[693]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:48.640987 ignition[693]: parsed url from cmdline: "" May 17 00:42:48.641741 systemd-networkd[690]: eth1: DHCPv4 address 10.124.0.17/20 acquired from 169.254.169.253 May 17 00:42:48.640990 ignition[693]: no config URL provided May 17 00:42:48.640997 ignition[693]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:42:48.641005 ignition[693]: no config at "/usr/lib/ignition/user.ign" May 17 00:42:48.641040 ignition[693]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 17 00:42:48.655672 systemd[1]: Finished dracut-initqueue.service. May 17 00:42:48.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.656185 systemd[1]: Reached target remote-fs-pre.target. May 17 00:42:48.656678 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:42:48.657226 systemd[1]: Reached target remote-fs.target. May 17 00:42:48.658816 systemd[1]: Starting dracut-pre-mount.service... May 17 00:42:48.665821 ignition[693]: GET result: OK May 17 00:42:48.665988 ignition[693]: parsing config with SHA512: 2eda352c066601854ddfeef9ec14a62413335905e81ac39cf106245fe182e6474829d6deb2ce223d987d8d129a834f05733b32b684ff5a01898be12e6bd1b293 May 17 00:42:48.674939 systemd[1]: Finished dracut-pre-mount.service. May 17 00:42:48.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.680274 unknown[693]: fetched base config from "system" May 17 00:42:48.680301 unknown[693]: fetched base config from "system" May 17 00:42:48.680766 ignition[693]: fetch: fetch complete May 17 00:42:48.680308 unknown[693]: fetched user config from "digitalocean" May 17 00:42:48.680772 ignition[693]: fetch: fetch passed May 17 00:42:48.680844 ignition[693]: Ignition finished successfully May 17 00:42:48.683961 systemd[1]: Finished ignition-fetch.service. May 17 00:42:48.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.685580 systemd[1]: Starting ignition-kargs.service... May 17 00:42:48.701354 ignition[716]: Ignition 2.14.0 May 17 00:42:48.701369 ignition[716]: Stage: kargs May 17 00:42:48.701548 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:48.701574 ignition[716]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:48.704121 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:48.706934 ignition[716]: kargs: kargs passed May 17 00:42:48.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.708368 systemd[1]: Finished ignition-kargs.service. May 17 00:42:48.707138 ignition[716]: Ignition finished successfully May 17 00:42:48.709889 systemd[1]: Starting ignition-disks.service... May 17 00:42:48.724041 ignition[722]: Ignition 2.14.0 May 17 00:42:48.724812 ignition[722]: Stage: disks May 17 00:42:48.725391 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:48.726099 ignition[722]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:48.727958 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:48.730812 ignition[722]: disks: disks passed May 17 00:42:48.730900 ignition[722]: Ignition finished successfully May 17 00:42:48.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.732692 systemd[1]: Finished ignition-disks.service. May 17 00:42:48.733371 systemd[1]: Reached target initrd-root-device.target. May 17 00:42:48.733829 systemd[1]: Reached target local-fs-pre.target. May 17 00:42:48.734499 systemd[1]: Reached target local-fs.target. May 17 00:42:48.735176 systemd[1]: Reached target sysinit.target. May 17 00:42:48.735814 systemd[1]: Reached target basic.target. May 17 00:42:48.738196 systemd[1]: Starting systemd-fsck-root.service... May 17 00:42:48.755516 systemd-fsck[730]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:42:48.759198 systemd[1]: Finished systemd-fsck-root.service. May 17 00:42:48.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.761334 systemd[1]: Mounting sysroot.mount... May 17 00:42:48.776317 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:42:48.777654 systemd[1]: Mounted sysroot.mount. May 17 00:42:48.778661 systemd[1]: Reached target initrd-root-fs.target. May 17 00:42:48.781335 systemd[1]: Mounting sysroot-usr.mount... May 17 00:42:48.783227 systemd[1]: Starting flatcar-digitalocean-network.service... May 17 00:42:48.785893 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:42:48.786972 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:42:48.787821 systemd[1]: Reached target ignition-diskful.target. May 17 00:42:48.790569 systemd[1]: Mounted sysroot-usr.mount. May 17 00:42:48.792791 systemd[1]: Starting initrd-setup-root.service... May 17 00:42:48.803390 initrd-setup-root[742]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:42:48.817963 initrd-setup-root[750]: cut: /sysroot/etc/group: No such file or directory May 17 00:42:48.829795 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:42:48.840413 initrd-setup-root[770]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:42:48.903329 coreos-metadata[737]: May 17 00:42:48.902 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:42:48.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.919185 systemd[1]: Finished initrd-setup-root.service. May 17 00:42:48.920665 systemd[1]: Starting ignition-mount.service... May 17 00:42:48.925425 coreos-metadata[737]: May 17 00:42:48.925 INFO Fetch successful May 17 00:42:48.926332 coreos-metadata[736]: May 17 00:42:48.926 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:42:48.927618 systemd[1]: Starting sysroot-boot.service... May 17 00:42:48.935394 coreos-metadata[737]: May 17 00:42:48.935 INFO wrote hostname ci-3510.3.7-n-f9c20123e0 to /sysroot/etc/hostname May 17 00:42:48.936858 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:42:48.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.939255 coreos-metadata[736]: May 17 00:42:48.939 INFO Fetch successful May 17 00:42:48.945861 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 17 00:42:48.945973 systemd[1]: Finished flatcar-digitalocean-network.service. May 17 00:42:48.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.947221 bash[787]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:42:48.960642 ignition[789]: INFO : Ignition 2.14.0 May 17 00:42:48.960642 ignition[789]: INFO : Stage: mount May 17 00:42:48.962039 ignition[789]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:48.962039 ignition[789]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:48.963195 ignition[789]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:48.964661 ignition[789]: INFO : mount: mount passed May 17 00:42:48.966087 ignition[789]: INFO : Ignition finished successfully May 17 00:42:48.965738 systemd[1]: Finished ignition-mount.service. May 17 00:42:48.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:48.966682 systemd[1]: Finished sysroot-boot.service. May 17 00:42:49.318759 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:42:49.328321 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (796) May 17 00:42:49.330903 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:42:49.330950 kernel: BTRFS info (device vda6): using free space tree May 17 00:42:49.330964 kernel: BTRFS info (device vda6): has skinny extents May 17 00:42:49.335697 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:42:49.337714 systemd[1]: Starting ignition-files.service... May 17 00:42:49.359969 ignition[816]: INFO : Ignition 2.14.0 May 17 00:42:49.360799 ignition[816]: INFO : Stage: files May 17 00:42:49.361368 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:49.361974 ignition[816]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:49.364759 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:49.368039 ignition[816]: DEBUG : files: compiled without relabeling support, skipping May 17 00:42:49.369565 ignition[816]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:42:49.369565 ignition[816]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:42:49.373699 ignition[816]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:42:49.374495 ignition[816]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:42:49.375866 unknown[816]: wrote ssh authorized keys file for user: core May 17 00:42:49.376650 ignition[816]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:42:49.377445 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:42:49.378194 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 17 00:42:49.418782 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:42:49.551092 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:42:49.552528 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:42:49.553217 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:42:49.553217 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:42:49.553217 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:42:49.553217 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:42:49.556054 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:42:49.556054 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:42:49.556054 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:42:49.558975 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:42:49.667811 systemd-networkd[690]: eth0: Gained IPv6LL May 17 00:42:50.412124 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 00:42:50.435822 systemd-networkd[690]: eth1: Gained IPv6LL May 17 00:42:50.703630 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:42:50.704612 ignition[816]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:42:50.705126 ignition[816]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:42:50.705789 ignition[816]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 17 00:42:50.706796 ignition[816]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:42:50.707957 ignition[816]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:42:50.708665 ignition[816]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 17 00:42:50.709147 ignition[816]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" May 17 00:42:50.710845 ignition[816]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:42:50.710845 ignition[816]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:42:50.710845 ignition[816]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:42:50.717592 ignition[816]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:42:50.718516 ignition[816]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:42:50.718516 ignition[816]: INFO : files: files passed May 17 00:42:50.718516 ignition[816]: INFO : Ignition finished successfully May 17 00:42:50.722958 systemd[1]: Finished ignition-files.service. May 17 00:42:50.731677 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:42:50.731719 kernel: audit: type=1130 audit(1747442570.723:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.724768 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:42:50.739761 kernel: audit: type=1130 audit(1747442570.734:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.739888 kernel: audit: type=1131 audit(1747442570.736:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.727785 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:42:50.729358 systemd[1]: Starting ignition-quench.service... May 17 00:42:50.733947 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:42:50.734065 systemd[1]: Finished ignition-quench.service. May 17 00:42:50.742428 initrd-setup-root-after-ignition[841]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:42:50.743069 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:42:50.746535 kernel: audit: type=1130 audit(1747442570.743:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.743681 systemd[1]: Reached target ignition-complete.target. May 17 00:42:50.747751 systemd[1]: Starting initrd-parse-etc.service... May 17 00:42:50.768105 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:42:50.768381 systemd[1]: Finished initrd-parse-etc.service. May 17 00:42:50.773569 kernel: audit: type=1130 audit(1747442570.768:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.773605 kernel: audit: type=1131 audit(1747442570.768:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.769321 systemd[1]: Reached target initrd-fs.target. May 17 00:42:50.774033 systemd[1]: Reached target initrd.target. May 17 00:42:50.774639 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:42:50.775916 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:42:50.795796 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:42:50.797881 systemd[1]: Starting initrd-cleanup.service... May 17 00:42:50.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.802338 kernel: audit: type=1130 audit(1747442570.796:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.820143 systemd[1]: Stopped target nss-lookup.target. May 17 00:42:50.821551 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:42:50.822838 systemd[1]: Stopped target timers.target. May 17 00:42:50.823990 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:42:50.824818 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:42:50.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.826230 systemd[1]: Stopped target initrd.target. May 17 00:42:50.830272 kernel: audit: type=1131 audit(1747442570.825:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.829995 systemd[1]: Stopped target basic.target. May 17 00:42:50.830590 systemd[1]: Stopped target ignition-complete.target. May 17 00:42:50.831469 systemd[1]: Stopped target ignition-diskful.target. May 17 00:42:50.838539 systemd[1]: Stopped target initrd-root-device.target. May 17 00:42:50.839560 systemd[1]: Stopped target remote-fs.target. May 17 00:42:50.840333 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:42:50.841645 systemd[1]: Stopped target sysinit.target. May 17 00:42:50.842573 systemd[1]: Stopped target local-fs.target. May 17 00:42:50.843623 systemd[1]: Stopped target local-fs-pre.target. May 17 00:42:50.844777 systemd[1]: Stopped target swap.target. May 17 00:42:50.845785 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:42:50.850659 kernel: audit: type=1131 audit(1747442570.846:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.846067 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:42:50.847107 systemd[1]: Stopped target cryptsetup.target. May 17 00:42:50.855839 kernel: audit: type=1131 audit(1747442570.851:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.851053 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:42:50.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.851277 systemd[1]: Stopped dracut-initqueue.service. May 17 00:42:50.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.852101 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:42:50.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.852282 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:42:50.856589 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:42:50.856725 systemd[1]: Stopped ignition-files.service. May 17 00:42:50.857260 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:42:50.857373 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:42:50.859297 systemd[1]: Stopping ignition-mount.service... May 17 00:42:50.860650 systemd[1]: Stopping iscsiuio.service... May 17 00:42:50.871172 systemd[1]: Stopping sysroot-boot.service... May 17 00:42:50.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.873675 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:42:50.873899 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:42:50.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.874448 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:42:50.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.885336 ignition[854]: INFO : Ignition 2.14.0 May 17 00:42:50.885336 ignition[854]: INFO : Stage: umount May 17 00:42:50.885336 ignition[854]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:50.874544 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:42:50.887450 ignition[854]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:50.887450 ignition[854]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:50.878281 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:42:50.878465 systemd[1]: Stopped iscsiuio.service. May 17 00:42:50.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.892951 ignition[854]: INFO : umount: umount passed May 17 00:42:50.892951 ignition[854]: INFO : Ignition finished successfully May 17 00:42:50.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.881928 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:42:50.882055 systemd[1]: Finished initrd-cleanup.service. May 17 00:42:50.890166 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:42:50.890367 systemd[1]: Stopped ignition-mount.service. May 17 00:42:50.892419 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:42:50.892499 systemd[1]: Stopped ignition-disks.service. May 17 00:42:50.893668 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:42:50.893745 systemd[1]: Stopped ignition-kargs.service. May 17 00:42:50.894184 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:42:50.894229 systemd[1]: Stopped ignition-fetch.service. May 17 00:42:50.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.900260 systemd[1]: Stopped target network.target. May 17 00:42:50.900649 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:42:50.900744 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:42:50.901108 systemd[1]: Stopped target paths.target. May 17 00:42:50.901409 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:42:50.903412 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:42:50.903761 systemd[1]: Stopped target slices.target. May 17 00:42:50.904471 systemd[1]: Stopped target sockets.target. May 17 00:42:50.904921 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:42:50.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.904974 systemd[1]: Closed iscsid.socket. May 17 00:42:50.905484 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:42:50.905534 systemd[1]: Closed iscsiuio.socket. May 17 00:42:50.911718 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:42:50.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.911836 systemd[1]: Stopped ignition-setup.service. May 17 00:42:50.923990 systemd[1]: Stopping systemd-networkd.service... May 17 00:42:50.930499 systemd-networkd[690]: eth1: DHCPv6 lease lost May 17 00:42:50.941535 systemd[1]: Stopping systemd-resolved.service... May 17 00:42:50.944039 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:42:50.944638 systemd-networkd[690]: eth0: DHCPv6 lease lost May 17 00:42:50.956000 audit: BPF prog-id=9 op=UNLOAD May 17 00:42:50.946250 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:42:50.946385 systemd[1]: Stopped systemd-networkd.service. May 17 00:42:50.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.953440 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:42:50.957417 systemd[1]: Stopped systemd-resolved.service. May 17 00:42:50.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.959000 audit: BPF prog-id=6 op=UNLOAD May 17 00:42:50.959058 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:42:50.959185 systemd[1]: Stopped sysroot-boot.service. May 17 00:42:50.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.960192 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:42:50.960243 systemd[1]: Closed systemd-networkd.socket. May 17 00:42:50.960618 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:42:50.960665 systemd[1]: Stopped initrd-setup-root.service. May 17 00:42:50.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.962604 systemd[1]: Stopping network-cleanup.service... May 17 00:42:50.963122 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:42:50.963201 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:42:50.963850 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:42:50.963896 systemd[1]: Stopped systemd-sysctl.service. May 17 00:42:50.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.966431 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:42:50.966494 systemd[1]: Stopped systemd-modules-load.service. May 17 00:42:50.972206 systemd[1]: Stopping systemd-udevd.service... May 17 00:42:50.973940 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:42:50.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.977396 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:42:50.977515 systemd[1]: Stopped network-cleanup.service. May 17 00:42:50.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.979684 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:42:50.979829 systemd[1]: Stopped systemd-udevd.service. May 17 00:42:50.980812 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:42:50.980867 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:42:50.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.981624 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:42:50.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.981660 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:42:50.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.982205 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:42:50.982281 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:42:50.982971 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:42:50.983016 systemd[1]: Stopped dracut-cmdline.service. May 17 00:42:50.983481 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:42:50.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.983518 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:42:50.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.985515 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:42:50.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.986025 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:42:50.986119 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:42:50.986940 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:42:50.986990 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:42:50.987410 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:42:50.987463 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:42:50.990157 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:42:50.999277 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:42:50.999410 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:42:50.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:50.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.000389 systemd[1]: Reached target initrd-switch-root.target. May 17 00:42:51.002040 systemd[1]: Starting initrd-switch-root.service... May 17 00:42:51.015954 systemd[1]: Switching root. May 17 00:42:51.038083 iscsid[701]: iscsid shutting down. May 17 00:42:51.038726 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). May 17 00:42:51.038803 systemd-journald[184]: Journal stopped May 17 00:42:54.981881 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:42:54.981972 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:42:54.981988 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:42:54.982000 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:42:54.982012 kernel: SELinux: policy capability open_perms=1 May 17 00:42:54.982023 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:42:54.982036 kernel: SELinux: policy capability always_check_network=0 May 17 00:42:54.982048 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:42:54.982068 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:42:54.982079 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:42:54.982091 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:42:54.982114 systemd[1]: Successfully loaded SELinux policy in 47.176ms. May 17 00:42:54.982137 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.742ms. May 17 00:42:54.982154 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:42:54.982168 systemd[1]: Detected virtualization kvm. May 17 00:42:54.982191 systemd[1]: Detected architecture x86-64. May 17 00:42:54.982208 systemd[1]: Detected first boot. May 17 00:42:54.982221 systemd[1]: Hostname set to . May 17 00:42:54.982233 systemd[1]: Initializing machine ID from VM UUID. May 17 00:42:54.982246 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:42:54.982259 systemd[1]: Populated /etc with preset unit settings. May 17 00:42:54.982272 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:54.982296 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:54.982437 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:54.982456 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:42:54.982469 systemd[1]: Stopped iscsid.service. May 17 00:42:54.982482 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:42:54.982495 systemd[1]: Stopped initrd-switch-root.service. May 17 00:42:54.982509 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:42:54.982528 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:42:54.982541 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:42:54.982554 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:42:54.982589 systemd[1]: Created slice system-getty.slice. May 17 00:42:54.982602 systemd[1]: Created slice system-modprobe.slice. May 17 00:42:54.982614 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:42:54.982629 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:42:54.982643 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:42:54.982655 systemd[1]: Created slice user.slice. May 17 00:42:54.982667 systemd[1]: Started systemd-ask-password-console.path. May 17 00:42:54.982680 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:42:54.982698 systemd[1]: Set up automount boot.automount. May 17 00:42:54.982711 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:42:54.982724 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:42:54.982736 systemd[1]: Stopped target initrd-fs.target. May 17 00:42:54.982748 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:42:54.982761 systemd[1]: Reached target integritysetup.target. May 17 00:42:54.982774 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:42:54.982790 systemd[1]: Reached target remote-fs.target. May 17 00:42:54.982803 systemd[1]: Reached target slices.target. May 17 00:42:54.982815 systemd[1]: Reached target swap.target. May 17 00:42:54.982828 systemd[1]: Reached target torcx.target. May 17 00:42:54.982841 systemd[1]: Reached target veritysetup.target. May 17 00:42:54.982854 systemd[1]: Listening on systemd-coredump.socket. May 17 00:42:54.982866 systemd[1]: Listening on systemd-initctl.socket. May 17 00:42:54.982879 systemd[1]: Listening on systemd-networkd.socket. May 17 00:42:54.982891 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:42:54.982905 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:42:54.982922 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:42:54.982935 systemd[1]: Mounting dev-hugepages.mount... May 17 00:42:54.982954 systemd[1]: Mounting dev-mqueue.mount... May 17 00:42:54.982972 systemd[1]: Mounting media.mount... May 17 00:42:54.982984 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:54.982997 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:42:54.983010 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:42:54.983022 systemd[1]: Mounting tmp.mount... May 17 00:42:54.983036 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:42:54.983063 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:54.983076 systemd[1]: Starting kmod-static-nodes.service... May 17 00:42:54.983090 systemd[1]: Starting modprobe@configfs.service... May 17 00:42:54.983102 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:54.983115 systemd[1]: Starting modprobe@drm.service... May 17 00:42:54.983127 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:54.983140 systemd[1]: Starting modprobe@fuse.service... May 17 00:42:54.983153 systemd[1]: Starting modprobe@loop.service... May 17 00:42:54.983166 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:42:54.983183 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:42:54.983196 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:42:54.983211 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:42:54.983225 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:42:54.983238 systemd[1]: Stopped systemd-journald.service. May 17 00:42:54.983251 kernel: fuse: init (API version 7.34) May 17 00:42:54.983268 systemd[1]: Starting systemd-journald.service... May 17 00:42:54.983280 systemd[1]: Starting systemd-modules-load.service... May 17 00:42:54.983303 systemd[1]: Starting systemd-network-generator.service... May 17 00:42:54.983321 systemd[1]: Starting systemd-remount-fs.service... May 17 00:42:54.983333 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:42:54.983347 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:42:54.983359 systemd[1]: Stopped verity-setup.service. May 17 00:42:54.983372 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:54.983384 kernel: loop: module loaded May 17 00:42:54.983396 systemd[1]: Mounted dev-hugepages.mount. May 17 00:42:54.983408 systemd[1]: Mounted dev-mqueue.mount. May 17 00:42:54.983420 systemd[1]: Mounted media.mount. May 17 00:42:54.983436 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:42:54.983449 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:42:54.983462 systemd[1]: Mounted tmp.mount. May 17 00:42:54.983475 systemd[1]: Finished kmod-static-nodes.service. May 17 00:42:54.983489 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:42:54.983517 systemd-journald[958]: Journal started May 17 00:42:54.983591 systemd-journald[958]: Runtime Journal (/run/log/journal/cf15f39f6b0c4f9b93134d8b534123ad) is 4.9M, max 39.5M, 34.5M free. May 17 00:42:51.170000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:42:51.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:42:54.985227 systemd[1]: Finished modprobe@configfs.service. May 17 00:42:51.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:42:51.221000 audit: BPF prog-id=10 op=LOAD May 17 00:42:51.221000 audit: BPF prog-id=10 op=UNLOAD May 17 00:42:51.221000 audit: BPF prog-id=11 op=LOAD May 17 00:42:51.221000 audit: BPF prog-id=11 op=UNLOAD May 17 00:42:51.319000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:42:51.319000 audit[887]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.319000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:42:51.321000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:42:51.321000 audit[887]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107999 a2=1ed a3=0 items=2 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.321000 audit: CWD cwd="/" May 17 00:42:51.321000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:51.321000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:51.321000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:42:54.788000 audit: BPF prog-id=12 op=LOAD May 17 00:42:54.788000 audit: BPF prog-id=3 op=UNLOAD May 17 00:42:54.788000 audit: BPF prog-id=13 op=LOAD May 17 00:42:54.788000 audit: BPF prog-id=14 op=LOAD May 17 00:42:54.788000 audit: BPF prog-id=4 op=UNLOAD May 17 00:42:54.788000 audit: BPF prog-id=5 op=UNLOAD May 17 00:42:54.987334 systemd[1]: Started systemd-journald.service. May 17 00:42:54.789000 audit: BPF prog-id=15 op=LOAD May 17 00:42:54.789000 audit: BPF prog-id=12 op=UNLOAD May 17 00:42:54.789000 audit: BPF prog-id=16 op=LOAD May 17 00:42:54.790000 audit: BPF prog-id=17 op=LOAD May 17 00:42:54.790000 audit: BPF prog-id=13 op=UNLOAD May 17 00:42:54.790000 audit: BPF prog-id=14 op=UNLOAD May 17 00:42:54.790000 audit: BPF prog-id=18 op=LOAD May 17 00:42:54.790000 audit: BPF prog-id=15 op=UNLOAD May 17 00:42:54.790000 audit: BPF prog-id=19 op=LOAD May 17 00:42:54.790000 audit: BPF prog-id=20 op=LOAD May 17 00:42:54.790000 audit: BPF prog-id=16 op=UNLOAD May 17 00:42:54.790000 audit: BPF prog-id=17 op=UNLOAD May 17 00:42:54.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.797000 audit: BPF prog-id=18 op=UNLOAD May 17 00:42:54.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.922000 audit: BPF prog-id=21 op=LOAD May 17 00:42:54.923000 audit: BPF prog-id=22 op=LOAD May 17 00:42:54.923000 audit: BPF prog-id=23 op=LOAD May 17 00:42:54.923000 audit: BPF prog-id=19 op=UNLOAD May 17 00:42:54.923000 audit: BPF prog-id=20 op=UNLOAD May 17 00:42:54.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.980000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:42:54.980000 audit[958]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffca59c1e40 a2=4000 a3=7ffca59c1edc items=0 ppid=1 pid=958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.980000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:42:54.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.785316 systemd[1]: Queued start job for default target multi-user.target. May 17 00:42:51.314346 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:54.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.785333 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:42:51.315672 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:42:54.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.791845 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:42:51.315695 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:42:54.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.988845 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:51.315738 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:42:54.989001 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:51.315768 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:42:54.989712 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:42:51.315823 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:42:54.989850 systemd[1]: Finished modprobe@drm.service. May 17 00:42:51.315838 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:42:54.990459 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:51.316089 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:42:54.990589 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:51.316128 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:42:54.991196 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:42:51.316141 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:42:54.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.991330 systemd[1]: Finished modprobe@fuse.service. May 17 00:42:51.318388 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:42:54.991937 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:51.318432 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:42:54.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.992056 systemd[1]: Finished modprobe@loop.service. May 17 00:42:51.318462 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:42:54.994962 systemd[1]: Finished systemd-modules-load.service. May 17 00:42:51.318478 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:42:54.995672 systemd[1]: Finished systemd-network-generator.service. May 17 00:42:51.318500 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:42:51.318516 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:42:54.996781 systemd[1]: Reached target network-pre.target. May 17 00:42:54.261803 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:54.262219 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:54.262402 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:54.262658 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:54.262729 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:42:54.262819 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-17T00:42:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:42:55.001078 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:42:55.004115 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:42:55.009449 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:55.013532 systemd[1]: Starting systemd-sysctl.service... May 17 00:42:55.018701 systemd[1]: Finished systemd-remount-fs.service. May 17 00:42:55.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.019549 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:42:55.020080 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:42:55.020758 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:42:55.025514 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:42:55.027584 systemd[1]: Starting systemd-journal-flush.service... May 17 00:42:55.028097 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:55.030351 systemd[1]: Starting systemd-random-seed.service... May 17 00:42:55.050654 systemd-journald[958]: Time spent on flushing to /var/log/journal/cf15f39f6b0c4f9b93134d8b534123ad is 52.473ms for 1153 entries. May 17 00:42:55.050654 systemd-journald[958]: System Journal (/var/log/journal/cf15f39f6b0c4f9b93134d8b534123ad) is 8.0M, max 195.6M, 187.6M free. May 17 00:42:55.115971 systemd-journald[958]: Received client request to flush runtime journal. May 17 00:42:55.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.053278 systemd[1]: Finished systemd-sysctl.service. May 17 00:42:55.058062 systemd[1]: Finished systemd-random-seed.service. May 17 00:42:55.058634 systemd[1]: Reached target first-boot-complete.target. May 17 00:42:55.090900 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:42:55.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.093793 systemd[1]: Starting systemd-sysusers.service... May 17 00:42:55.117772 systemd[1]: Finished systemd-journal-flush.service. May 17 00:42:55.141083 systemd[1]: Finished systemd-sysusers.service. May 17 00:42:55.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.144224 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:42:55.161772 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:42:55.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.163956 systemd[1]: Starting systemd-udev-settle.service... May 17 00:42:55.178527 udevadm[999]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:42:55.200818 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:42:55.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.820043 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:42:55.824717 kernel: kauditd_printk_skb: 109 callbacks suppressed May 17 00:42:55.824876 kernel: audit: type=1130 audit(1747442575.820:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.827353 kernel: audit: type=1334 audit(1747442575.821:150): prog-id=24 op=LOAD May 17 00:42:55.827478 kernel: audit: type=1334 audit(1747442575.824:151): prog-id=25 op=LOAD May 17 00:42:55.821000 audit: BPF prog-id=24 op=LOAD May 17 00:42:55.824000 audit: BPF prog-id=25 op=LOAD May 17 00:42:55.826375 systemd[1]: Starting systemd-udevd.service... May 17 00:42:55.829125 kernel: audit: type=1334 audit(1747442575.824:152): prog-id=7 op=UNLOAD May 17 00:42:55.824000 audit: BPF prog-id=7 op=UNLOAD May 17 00:42:55.824000 audit: BPF prog-id=8 op=UNLOAD May 17 00:42:55.830355 kernel: audit: type=1334 audit(1747442575.824:153): prog-id=8 op=UNLOAD May 17 00:42:55.857977 systemd-udevd[1000]: Using default interface naming scheme 'v252'. May 17 00:42:55.894555 systemd[1]: Started systemd-udevd.service. May 17 00:42:55.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.896000 audit: BPF prog-id=26 op=LOAD May 17 00:42:55.902957 kernel: audit: type=1130 audit(1747442575.894:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.903101 kernel: audit: type=1334 audit(1747442575.896:155): prog-id=26 op=LOAD May 17 00:42:55.903982 systemd[1]: Starting systemd-networkd.service... May 17 00:42:55.913000 audit: BPF prog-id=27 op=LOAD May 17 00:42:55.913000 audit: BPF prog-id=28 op=LOAD May 17 00:42:55.917705 kernel: audit: type=1334 audit(1747442575.913:156): prog-id=27 op=LOAD May 17 00:42:55.917814 kernel: audit: type=1334 audit(1747442575.913:157): prog-id=28 op=LOAD May 17 00:42:55.918082 systemd[1]: Starting systemd-userdbd.service... May 17 00:42:55.913000 audit: BPF prog-id=29 op=LOAD May 17 00:42:55.920327 kernel: audit: type=1334 audit(1747442575.913:158): prog-id=29 op=LOAD May 17 00:42:55.979101 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:55.979469 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:55.983095 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:55.989672 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:55.992365 systemd[1]: Starting modprobe@loop.service... May 17 00:42:55.992969 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:42:55.993075 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:42:55.993233 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:55.994051 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:55.994344 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:55.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.995440 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:55.996376 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:55.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.997113 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:55.998845 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:55.999054 systemd[1]: Finished modprobe@loop.service. May 17 00:42:55.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:55.999813 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:56.003946 systemd[1]: Started systemd-userdbd.service. May 17 00:42:56.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.093884 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:42:56.100255 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:42:56.111677 systemd-networkd[1005]: lo: Link UP May 17 00:42:56.111691 systemd-networkd[1005]: lo: Gained carrier May 17 00:42:56.112454 systemd-networkd[1005]: Enumeration completed May 17 00:42:56.112645 systemd[1]: Started systemd-networkd.service. May 17 00:42:56.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.113451 systemd-networkd[1005]: eth1: Configuring with /run/systemd/network/10-c6:ff:fc:f3:96:32.network. May 17 00:42:56.115049 systemd-networkd[1005]: eth0: Configuring with /run/systemd/network/10-5e:ec:ce:a9:4f:5a.network. May 17 00:42:56.116124 systemd-networkd[1005]: eth1: Link UP May 17 00:42:56.116134 systemd-networkd[1005]: eth1: Gained carrier May 17 00:42:56.121794 systemd-networkd[1005]: eth0: Link UP May 17 00:42:56.121807 systemd-networkd[1005]: eth0: Gained carrier May 17 00:42:56.153323 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:42:56.157384 kernel: ACPI: button: Power Button [PWRF] May 17 00:42:56.210000 audit[1006]: AVC avc: denied { confidentiality } for pid=1006 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:42:56.210000 audit[1006]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a462bb27f0 a1=338ac a2=7f9068d9cbc5 a3=5 items=110 ppid=1000 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.210000 audit: CWD cwd="/" May 17 00:42:56.210000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=1 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=2 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=3 name=(null) inode=14071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=4 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=5 name=(null) inode=14072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=6 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=7 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=8 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=9 name=(null) inode=14074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=10 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=11 name=(null) inode=14075 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=12 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=13 name=(null) inode=14076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=14 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=15 name=(null) inode=14077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=16 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=17 name=(null) inode=14078 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=18 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=19 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=20 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=21 name=(null) inode=14080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=22 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=23 name=(null) inode=14081 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=24 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=25 name=(null) inode=14082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=26 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=27 name=(null) inode=14083 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=28 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=29 name=(null) inode=14084 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=30 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=31 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=32 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=33 name=(null) inode=14086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=34 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=35 name=(null) inode=14087 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=36 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=37 name=(null) inode=14088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=38 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=39 name=(null) inode=14089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=40 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=41 name=(null) inode=14090 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=42 name=(null) inode=14070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=43 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=44 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=45 name=(null) inode=14092 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=46 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=47 name=(null) inode=14093 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=48 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=49 name=(null) inode=14094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=50 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=51 name=(null) inode=14095 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=52 name=(null) inode=14091 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=53 name=(null) inode=14096 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=55 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=56 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=57 name=(null) inode=14098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=58 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=59 name=(null) inode=14099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=60 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=61 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=62 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=63 name=(null) inode=14101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=64 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=65 name=(null) inode=14102 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=66 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=67 name=(null) inode=14103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=68 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=69 name=(null) inode=14104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=70 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=71 name=(null) inode=14105 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=72 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=73 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=74 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=75 name=(null) inode=14107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=76 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=77 name=(null) inode=14108 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=78 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=79 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=80 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=81 name=(null) inode=14110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=82 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=83 name=(null) inode=14111 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=84 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=85 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=86 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=87 name=(null) inode=14113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=88 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=89 name=(null) inode=14114 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=90 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=91 name=(null) inode=14115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=92 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=93 name=(null) inode=14116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=94 name=(null) inode=14112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=95 name=(null) inode=14117 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=96 name=(null) inode=14097 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=97 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=98 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=99 name=(null) inode=14119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=100 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=101 name=(null) inode=14120 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=102 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=103 name=(null) inode=14121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=104 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=105 name=(null) inode=14122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=106 name=(null) inode=14118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=107 name=(null) inode=14123 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PATH item=109 name=(null) inode=14124 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:56.210000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:42:56.232333 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:42:56.265344 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:42:56.273331 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 17 00:42:56.399342 kernel: EDAC MC: Ver: 3.0.0 May 17 00:42:56.422089 systemd[1]: Finished systemd-udev-settle.service. May 17 00:42:56.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.425037 systemd[1]: Starting lvm2-activation-early.service... May 17 00:42:56.444600 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:42:56.472230 systemd[1]: Finished lvm2-activation-early.service. May 17 00:42:56.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.472957 systemd[1]: Reached target cryptsetup.target. May 17 00:42:56.475613 systemd[1]: Starting lvm2-activation.service... May 17 00:42:56.483018 lvm[1039]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:42:56.511469 systemd[1]: Finished lvm2-activation.service. May 17 00:42:56.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.512466 systemd[1]: Reached target local-fs-pre.target. May 17 00:42:56.516054 systemd[1]: Mounting media-configdrive.mount... May 17 00:42:56.516698 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:42:56.516803 systemd[1]: Reached target machines.target. May 17 00:42:56.519274 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:42:56.535324 kernel: ISO 9660 Extensions: RRIP_1991A May 17 00:42:56.536821 systemd[1]: Mounted media-configdrive.mount. May 17 00:42:56.537398 systemd[1]: Reached target local-fs.target. May 17 00:42:56.539560 systemd[1]: Starting ldconfig.service... May 17 00:42:56.541011 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:56.541087 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:56.542906 systemd[1]: Starting systemd-boot-update.service... May 17 00:42:56.547509 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:42:56.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.550534 systemd[1]: Starting systemd-sysext.service... May 17 00:42:56.554010 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:42:56.565567 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) May 17 00:42:56.567366 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:42:56.576789 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:42:56.587123 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:42:56.587420 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:42:56.601179 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:42:56.602022 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:42:56.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.605327 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:42:56.651330 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:42:56.671383 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:42:56.691899 (sd-sysext)[1055]: Using extensions 'kubernetes'. May 17 00:42:56.694468 (sd-sysext)[1055]: Merged extensions into '/usr'. May 17 00:42:56.702120 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) May 17 00:42:56.702120 systemd-fsck[1052]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:42:56.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.710476 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:42:56.713229 systemd[1]: Mounting boot.mount... May 17 00:42:56.734960 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:56.738925 systemd[1]: Mounting usr-share-oem.mount... May 17 00:42:56.739882 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:56.742272 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:56.746067 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:56.748753 systemd[1]: Starting modprobe@loop.service... May 17 00:42:56.750549 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:56.750796 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:56.751039 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:56.752651 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:56.752860 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:56.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.764170 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:56.764379 systemd[1]: Finished modprobe@loop.service. May 17 00:42:56.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.765799 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:56.765962 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:56.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.767819 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:56.768012 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:56.773278 systemd[1]: Mounted boot.mount. May 17 00:42:56.774632 systemd[1]: Mounted usr-share-oem.mount. May 17 00:42:56.782079 systemd[1]: Finished systemd-sysext.service. May 17 00:42:56.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:56.784554 systemd[1]: Starting ensure-sysext.service... May 17 00:42:56.786894 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:42:56.799391 systemd[1]: Reloading. May 17 00:42:56.818640 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:42:56.822032 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:42:56.825178 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:42:56.992523 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:42:56.997798 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-05-17T00:42:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:56.998295 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-05-17T00:42:56Z" level=info msg="torcx already run" May 17 00:42:57.139273 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:57.139343 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:57.171461 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:57.241000 audit: BPF prog-id=30 op=LOAD May 17 00:42:57.241000 audit: BPF prog-id=31 op=LOAD May 17 00:42:57.241000 audit: BPF prog-id=24 op=UNLOAD May 17 00:42:57.241000 audit: BPF prog-id=25 op=UNLOAD May 17 00:42:57.242000 audit: BPF prog-id=32 op=LOAD May 17 00:42:57.242000 audit: BPF prog-id=26 op=UNLOAD May 17 00:42:57.246000 audit: BPF prog-id=33 op=LOAD May 17 00:42:57.246000 audit: BPF prog-id=27 op=UNLOAD May 17 00:42:57.246000 audit: BPF prog-id=34 op=LOAD May 17 00:42:57.246000 audit: BPF prog-id=35 op=LOAD May 17 00:42:57.246000 audit: BPF prog-id=28 op=UNLOAD May 17 00:42:57.246000 audit: BPF prog-id=29 op=UNLOAD May 17 00:42:57.247000 audit: BPF prog-id=36 op=LOAD May 17 00:42:57.247000 audit: BPF prog-id=21 op=UNLOAD May 17 00:42:57.247000 audit: BPF prog-id=37 op=LOAD May 17 00:42:57.247000 audit: BPF prog-id=38 op=LOAD May 17 00:42:57.247000 audit: BPF prog-id=22 op=UNLOAD May 17 00:42:57.247000 audit: BPF prog-id=23 op=UNLOAD May 17 00:42:57.250217 systemd[1]: Finished ldconfig.service. May 17 00:42:57.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.251165 systemd[1]: Finished systemd-boot-update.service. May 17 00:42:57.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.253316 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:42:57.259001 systemd[1]: Starting audit-rules.service... May 17 00:42:57.261595 systemd[1]: Starting clean-ca-certificates.service... May 17 00:42:57.264067 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:42:57.269000 audit: BPF prog-id=39 op=LOAD May 17 00:42:57.270950 systemd[1]: Starting systemd-resolved.service... May 17 00:42:57.272000 audit: BPF prog-id=40 op=LOAD May 17 00:42:57.275488 systemd[1]: Starting systemd-timesyncd.service... May 17 00:42:57.282512 systemd[1]: Starting systemd-update-utmp.service... May 17 00:42:57.289008 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:57.292706 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:57.296690 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:57.300623 systemd[1]: Starting modprobe@loop.service... May 17 00:42:57.301149 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:57.301370 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:57.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.304478 systemd[1]: Finished clean-ca-certificates.service. May 17 00:42:57.307351 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:57.307544 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:57.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.308708 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:57.308867 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:57.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.309883 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:57.309978 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:42:57.310547 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:57.310731 systemd[1]: Finished modprobe@loop.service. May 17 00:42:57.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.314145 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:57.318810 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:57.321767 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:57.324747 systemd[1]: Starting modprobe@loop.service... May 17 00:42:57.325548 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:57.325737 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:57.325887 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:42:57.332606 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:57.332839 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:57.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.334326 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:57.338163 systemd[1]: Starting modprobe@drm.service... May 17 00:42:57.338792 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:57.338956 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:57.342000 audit[1139]: SYSTEM_BOOT pid=1139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:42:57.346848 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:42:57.347354 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:57.347595 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:42:57.348851 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:57.349130 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:57.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.354397 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:42:57.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.355857 systemd[1]: Finished ensure-sysext.service. May 17 00:42:57.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.362971 systemd[1]: Starting systemd-update-done.service... May 17 00:42:57.366965 systemd[1]: Finished systemd-update-utmp.service. May 17 00:42:57.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.368742 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:57.368894 systemd[1]: Finished modprobe@loop.service. May 17 00:42:57.369531 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:57.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.371713 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:42:57.371895 systemd[1]: Finished modprobe@drm.service. May 17 00:42:57.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.380244 systemd[1]: Finished systemd-update-done.service. May 17 00:42:57.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.411000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:42:57.411000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc986ec1d0 a2=420 a3=0 items=0 ppid=1131 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.411000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:42:57.412446 augenrules[1160]: No rules May 17 00:42:57.412577 systemd[1]: Finished audit-rules.service. May 17 00:42:57.418912 systemd[1]: Started systemd-timesyncd.service. May 17 00:42:57.419448 systemd[1]: Reached target time-set.target. May 17 00:42:57.433517 systemd-resolved[1134]: Positive Trust Anchors: May 17 00:42:57.433918 systemd-resolved[1134]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:42:57.434049 systemd-resolved[1134]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:42:57.441090 systemd-resolved[1134]: Using system hostname 'ci-3510.3.7-n-f9c20123e0'. May 17 00:42:57.443954 systemd[1]: Started systemd-resolved.service. May 17 00:42:57.444535 systemd[1]: Reached target network.target. May 17 00:42:57.444859 systemd[1]: Reached target nss-lookup.target. May 17 00:42:57.445158 systemd[1]: Reached target sysinit.target. May 17 00:42:57.445547 systemd[1]: Started motdgen.path. May 17 00:42:57.445865 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:42:57.446457 systemd[1]: Started logrotate.timer. May 17 00:42:57.446826 systemd[1]: Started mdadm.timer. May 17 00:42:57.447127 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:42:57.447475 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:42:57.447505 systemd[1]: Reached target paths.target. May 17 00:42:57.447770 systemd[1]: Reached target timers.target. May 17 00:42:57.448591 systemd[1]: Listening on dbus.socket. May 17 00:42:57.450524 systemd[1]: Starting docker.socket... May 17 00:42:57.455120 systemd[1]: Listening on sshd.socket. May 17 00:42:57.455922 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:57.456777 systemd[1]: Listening on docker.socket. May 17 00:42:57.457238 systemd[1]: Reached target sockets.target. May 17 00:42:57.463573 systemd[1]: Reached target basic.target. May 17 00:42:57.463996 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:42:57.464026 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:42:57.465729 systemd[1]: Starting containerd.service... May 17 00:42:57.467805 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:42:57.470844 systemd[1]: Starting dbus.service... May 17 00:42:57.477131 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:42:57.479100 systemd[1]: Starting extend-filesystems.service... May 17 00:42:57.479565 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:42:57.483425 systemd[1]: Starting motdgen.service... May 17 00:42:57.484551 jq[1173]: false May 17 00:42:57.488390 systemd[1]: Starting prepare-helm.service... May 17 00:42:57.490481 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:42:57.494529 systemd[1]: Starting sshd-keygen.service... May 17 00:42:57.498059 systemd[1]: Starting systemd-logind.service... May 17 00:42:57.500418 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:57.500527 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:42:57.501176 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:42:57.502349 systemd[1]: Starting update-engine.service... May 17 00:42:57.508280 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:42:57.511396 jq[1185]: true May 17 00:42:57.515795 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:42:57.516139 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:42:57.529511 tar[1187]: linux-amd64/LICENSE May 17 00:42:57.530024 tar[1187]: linux-amd64/helm May 17 00:42:57.535929 extend-filesystems[1174]: Found loop1 May 17 00:42:57.536573 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:57.536603 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:57.545063 extend-filesystems[1174]: Found vda May 17 00:42:57.546818 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:42:57.547069 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:42:57.547255 extend-filesystems[1174]: Found vda1 May 17 00:42:57.547966 extend-filesystems[1174]: Found vda2 May 17 00:42:57.549475 extend-filesystems[1174]: Found vda3 May 17 00:42:57.549935 extend-filesystems[1174]: Found usr May 17 00:42:57.553687 extend-filesystems[1174]: Found vda4 May 17 00:42:57.554235 extend-filesystems[1174]: Found vda6 May 17 00:42:57.554654 extend-filesystems[1174]: Found vda7 May 17 00:42:57.555061 extend-filesystems[1174]: Found vda9 May 17 00:42:57.555500 extend-filesystems[1174]: Checking size of /dev/vda9 May 17 00:42:57.577056 jq[1188]: true May 17 00:42:57.598185 dbus-daemon[1170]: [system] SELinux support is enabled May 17 00:42:57.598419 systemd[1]: Started dbus.service. May 17 00:42:57.601102 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:42:57.601136 systemd[1]: Reached target system-config.target. May 17 00:42:57.601678 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:42:57.601701 systemd[1]: Reached target user-config.target. May 17 00:42:57.624646 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:42:57.624872 systemd[1]: Finished motdgen.service. May 17 00:42:57.640950 update_engine[1182]: I0517 00:42:57.640080 1182 main.cc:92] Flatcar Update Engine starting May 17 00:42:57.651610 systemd[1]: Started update-engine.service. May 17 00:42:57.652005 update_engine[1182]: I0517 00:42:57.651974 1182 update_check_scheduler.cc:74] Next update check in 3m35s May 17 00:42:57.654540 systemd[1]: Started locksmithd.service. May 17 00:42:57.664349 extend-filesystems[1174]: Resized partition /dev/vda9 May 17 00:42:57.674847 extend-filesystems[1222]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:42:57.688647 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 17 00:42:57.718275 bash[1223]: Updated "/home/core/.ssh/authorized_keys" May 17 00:42:57.719089 env[1190]: time="2025-05-17T00:42:57.719034875Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:42:57.719881 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:42:57.724111 systemd-logind[1179]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:42:57.724188 systemd-logind[1179]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:42:57.727313 systemd-logind[1179]: New seat seat0. May 17 00:42:57.729951 systemd[1]: Started systemd-logind.service. May 17 00:42:57.779338 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 17 00:42:57.790058 env[1190]: time="2025-05-17T00:42:57.784226331Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:42:57.790230 env[1190]: time="2025-05-17T00:42:57.790187485Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.794253 env[1190]: time="2025-05-17T00:42:57.794192914Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:42:57.794253 env[1190]: time="2025-05-17T00:42:57.794239114Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.794600 env[1190]: time="2025-05-17T00:42:57.794569277Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:42:57.794664 env[1190]: time="2025-05-17T00:42:57.794598923Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.794664 env[1190]: time="2025-05-17T00:42:57.794617928Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:42:57.794664 env[1190]: time="2025-05-17T00:42:57.794633046Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.794734 env[1190]: time="2025-05-17T00:42:57.794724051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.794998 env[1190]: time="2025-05-17T00:42:57.794976393Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:42:57.795160 env[1190]: time="2025-05-17T00:42:57.795138630Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:42:57.795160 env[1190]: time="2025-05-17T00:42:57.795157572Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:42:57.795234 env[1190]: time="2025-05-17T00:42:57.795212175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:42:57.795234 env[1190]: time="2025-05-17T00:42:57.795224337Z" level=info msg="metadata content store policy set" policy=shared May 17 00:42:57.795730 extend-filesystems[1222]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:42:57.795730 extend-filesystems[1222]: old_desc_blocks = 1, new_desc_blocks = 8 May 17 00:42:57.795730 extend-filesystems[1222]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 17 00:42:57.797817 extend-filesystems[1174]: Resized filesystem in /dev/vda9 May 17 00:42:57.797817 extend-filesystems[1174]: Found vdb May 17 00:42:57.797169 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:42:57.797365 systemd[1]: Finished extend-filesystems.service. May 17 00:42:57.801015 env[1190]: time="2025-05-17T00:42:57.800961757Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:42:57.801125 env[1190]: time="2025-05-17T00:42:57.801026523Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:42:57.801125 env[1190]: time="2025-05-17T00:42:57.801045030Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:42:57.801125 env[1190]: time="2025-05-17T00:42:57.801094556Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801125 env[1190]: time="2025-05-17T00:42:57.801112567Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801241 env[1190]: time="2025-05-17T00:42:57.801126188Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801241 env[1190]: time="2025-05-17T00:42:57.801189496Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801241 env[1190]: time="2025-05-17T00:42:57.801205685Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801241 env[1190]: time="2025-05-17T00:42:57.801218028Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801241 env[1190]: time="2025-05-17T00:42:57.801230401Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801392 env[1190]: time="2025-05-17T00:42:57.801265699Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:42:57.801392 env[1190]: time="2025-05-17T00:42:57.801283159Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:42:57.801472 env[1190]: time="2025-05-17T00:42:57.801441196Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:42:57.801582 env[1190]: time="2025-05-17T00:42:57.801562109Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:42:57.801959 env[1190]: time="2025-05-17T00:42:57.801934936Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:42:57.802021 env[1190]: time="2025-05-17T00:42:57.801971656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802021 env[1190]: time="2025-05-17T00:42:57.801998544Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:42:57.802071 env[1190]: time="2025-05-17T00:42:57.802055615Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802137 env[1190]: time="2025-05-17T00:42:57.802119917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802173 env[1190]: time="2025-05-17T00:42:57.802137329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802204 env[1190]: time="2025-05-17T00:42:57.802170610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802204 env[1190]: time="2025-05-17T00:42:57.802194743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802334 env[1190]: time="2025-05-17T00:42:57.802208391Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802334 env[1190]: time="2025-05-17T00:42:57.802231548Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802334 env[1190]: time="2025-05-17T00:42:57.802243684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802334 env[1190]: time="2025-05-17T00:42:57.802272607Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:42:57.802649 env[1190]: time="2025-05-17T00:42:57.802628331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802716 env[1190]: time="2025-05-17T00:42:57.802648783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802716 env[1190]: time="2025-05-17T00:42:57.802662053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:42:57.802716 env[1190]: time="2025-05-17T00:42:57.802673593Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:42:57.802716 env[1190]: time="2025-05-17T00:42:57.802702434Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:42:57.802716 env[1190]: time="2025-05-17T00:42:57.802714694Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:42:57.802841 env[1190]: time="2025-05-17T00:42:57.802736119Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:42:57.802841 env[1190]: time="2025-05-17T00:42:57.802792597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:42:57.803083 env[1190]: time="2025-05-17T00:42:57.803028601Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.803097134Z" level=info msg="Connect containerd service" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.803137866Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804109561Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804352319Z" level=info msg="Start subscribing containerd event" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804434132Z" level=info msg="Start recovering state" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804526483Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804582579Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804924368Z" level=info msg="Start event monitor" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804940094Z" level=info msg="Start snapshots syncer" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804950053Z" level=info msg="Start cni network conf syncer for default" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.804959538Z" level=info msg="Start streaming server" May 17 00:42:57.806393 env[1190]: time="2025-05-17T00:42:57.805825211Z" level=info msg="containerd successfully booted in 0.094907s" May 17 00:42:57.804759 systemd[1]: Started containerd.service. May 17 00:42:57.828575 coreos-metadata[1169]: May 17 00:42:57.828 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:42:57.844446 coreos-metadata[1169]: May 17 00:42:57.842 INFO Fetch successful May 17 00:42:57.847846 unknown[1169]: wrote ssh authorized keys file for user: core May 17 00:42:57.862995 update-ssh-keys[1231]: Updated "/home/core/.ssh/authorized_keys" May 17 00:42:57.863669 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:42:57.881735 systemd-timesyncd[1136]: Contacted time server 23.186.168.125:123 (0.flatcar.pool.ntp.org). May 17 00:42:57.882107 systemd-timesyncd[1136]: Initial clock synchronization to Sat 2025-05-17 00:42:57.676834 UTC. May 17 00:42:57.987610 systemd-networkd[1005]: eth0: Gained IPv6LL May 17 00:42:57.991074 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:42:57.991828 systemd[1]: Reached target network-online.target. May 17 00:42:57.994456 systemd[1]: Starting kubelet.service... May 17 00:42:58.051897 systemd-networkd[1005]: eth1: Gained IPv6LL May 17 00:42:58.369633 tar[1187]: linux-amd64/README.md May 17 00:42:58.375216 systemd[1]: Finished prepare-helm.service. May 17 00:42:58.539796 locksmithd[1218]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:42:58.964809 systemd[1]: Created slice system-sshd.slice. May 17 00:42:59.157258 sshd_keygen[1191]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:42:59.215953 systemd[1]: Finished sshd-keygen.service. May 17 00:42:59.221243 systemd[1]: Starting issuegen.service... May 17 00:42:59.226087 systemd[1]: Started sshd@0-134.199.236.151:22-147.75.109.163:51288.service. May 17 00:42:59.249707 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:42:59.249985 systemd[1]: Finished issuegen.service. May 17 00:42:59.253801 systemd[1]: Starting systemd-user-sessions.service... May 17 00:42:59.270574 systemd[1]: Finished systemd-user-sessions.service. May 17 00:42:59.274067 systemd[1]: Started getty@tty1.service. May 17 00:42:59.278341 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:42:59.279163 systemd[1]: Reached target getty.target. May 17 00:42:59.328858 sshd[1249]: Accepted publickey for core from 147.75.109.163 port 51288 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:42:59.332692 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:59.350164 systemd[1]: Created slice user-500.slice. May 17 00:42:59.353065 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:42:59.360680 systemd-logind[1179]: New session 1 of user core. May 17 00:42:59.372045 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:42:59.378580 systemd[1]: Starting user@500.service... May 17 00:42:59.385436 (systemd)[1258]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:59.481822 systemd[1]: Started kubelet.service. May 17 00:42:59.485074 systemd[1]: Reached target multi-user.target. May 17 00:42:59.491388 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:42:59.519922 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:42:59.520110 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:42:59.567173 systemd[1258]: Queued start job for default target default.target. May 17 00:42:59.568067 systemd[1258]: Reached target paths.target. May 17 00:42:59.568101 systemd[1258]: Reached target sockets.target. May 17 00:42:59.568122 systemd[1258]: Reached target timers.target. May 17 00:42:59.568143 systemd[1258]: Reached target basic.target. May 17 00:42:59.568211 systemd[1258]: Reached target default.target. May 17 00:42:59.568256 systemd[1258]: Startup finished in 165ms. May 17 00:42:59.568569 systemd[1]: Started user@500.service. May 17 00:42:59.570701 systemd[1]: Started session-1.scope. May 17 00:42:59.571430 systemd[1]: Startup finished in 894ms (kernel) + 5.370s (initrd) + 8.455s (userspace) = 14.720s. May 17 00:42:59.647704 systemd[1]: Started sshd@1-134.199.236.151:22-147.75.109.163:51294.service. May 17 00:42:59.722731 sshd[1276]: Accepted publickey for core from 147.75.109.163 port 51294 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:42:59.724955 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:59.732255 systemd[1]: Started session-2.scope. May 17 00:42:59.733383 systemd-logind[1179]: New session 2 of user core. May 17 00:42:59.804162 sshd[1276]: pam_unix(sshd:session): session closed for user core May 17 00:42:59.811831 systemd[1]: Started sshd@2-134.199.236.151:22-147.75.109.163:51302.service. May 17 00:42:59.812603 systemd[1]: sshd@1-134.199.236.151:22-147.75.109.163:51294.service: Deactivated successfully. May 17 00:42:59.813463 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:42:59.818481 systemd-logind[1179]: Session 2 logged out. Waiting for processes to exit. May 17 00:42:59.822639 systemd-logind[1179]: Removed session 2. May 17 00:42:59.871657 sshd[1281]: Accepted publickey for core from 147.75.109.163 port 51302 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:42:59.872777 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:59.881866 systemd[1]: Started session-3.scope. May 17 00:42:59.882274 systemd-logind[1179]: New session 3 of user core. May 17 00:42:59.946570 sshd[1281]: pam_unix(sshd:session): session closed for user core May 17 00:42:59.955197 systemd[1]: Started sshd@3-134.199.236.151:22-147.75.109.163:51310.service. May 17 00:42:59.959531 systemd[1]: sshd@2-134.199.236.151:22-147.75.109.163:51302.service: Deactivated successfully. May 17 00:42:59.960764 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:42:59.962868 systemd-logind[1179]: Session 3 logged out. Waiting for processes to exit. May 17 00:42:59.964601 systemd-logind[1179]: Removed session 3. May 17 00:43:00.010076 sshd[1287]: Accepted publickey for core from 147.75.109.163 port 51310 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:00.012629 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:00.018998 systemd[1]: Started session-4.scope. May 17 00:43:00.019646 systemd-logind[1179]: New session 4 of user core. May 17 00:43:00.089878 sshd[1287]: pam_unix(sshd:session): session closed for user core May 17 00:43:00.096818 systemd[1]: Started sshd@4-134.199.236.151:22-147.75.109.163:51320.service. May 17 00:43:00.097659 systemd[1]: sshd@3-134.199.236.151:22-147.75.109.163:51310.service: Deactivated successfully. May 17 00:43:00.098789 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:43:00.100504 systemd-logind[1179]: Session 4 logged out. Waiting for processes to exit. May 17 00:43:00.102085 systemd-logind[1179]: Removed session 4. May 17 00:43:00.151459 sshd[1293]: Accepted publickey for core from 147.75.109.163 port 51320 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:00.155105 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:00.163806 systemd[1]: Started session-5.scope. May 17 00:43:00.165394 systemd-logind[1179]: New session 5 of user core. May 17 00:43:00.247849 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:43:00.248173 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:43:00.260981 dbus-daemon[1170]: \xd0=R\xcb audit_backlog_limit=64 May 17 00:43:17.366012 kernel: audit: type=1400 audit(1747442597.348:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.366061 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:43:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.370152 kernel: audit: type=1400 audit(1747442597.348:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.370327 kernel: audit: backlog limit exceeded May 17 00:43:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.354000 audit: BPF prog-id=46 op=LOAD May 17 00:43:17.354000 audit: BPF prog-id=40 op=UNLOAD May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit: BPF prog-id=47 op=LOAD May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit: BPF prog-id=48 op=LOAD May 17 00:43:17.355000 audit: BPF prog-id=30 op=UNLOAD May 17 00:43:17.355000 audit: BPF prog-id=31 op=UNLOAD May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit: BPF prog-id=49 op=LOAD May 17 00:43:17.359000 audit: BPF prog-id=41 op=UNLOAD May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit: BPF prog-id=50 op=LOAD May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.359000 audit: BPF prog-id=51 op=LOAD May 17 00:43:17.359000 audit: BPF prog-id=42 op=UNLOAD May 17 00:43:17.359000 audit: BPF prog-id=43 op=UNLOAD May 17 00:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.371000 audit: BPF prog-id=53 op=LOAD May 17 00:43:17.371000 audit: BPF prog-id=39 op=UNLOAD May 17 00:43:17.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.374000 audit: BPF prog-id=54 op=LOAD May 17 00:43:17.374000 audit: BPF prog-id=44 op=UNLOAD May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit: BPF prog-id=55 op=LOAD May 17 00:43:17.376000 audit: BPF prog-id=33 op=UNLOAD May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit: BPF prog-id=56 op=LOAD May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.376000 audit: BPF prog-id=57 op=LOAD May 17 00:43:17.377000 audit: BPF prog-id=34 op=UNLOAD May 17 00:43:17.377000 audit: BPF prog-id=35 op=UNLOAD May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit: BPF prog-id=58 op=LOAD May 17 00:43:17.378000 audit: BPF prog-id=36 op=UNLOAD May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit: BPF prog-id=59 op=LOAD May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:17.378000 audit: BPF prog-id=60 op=LOAD May 17 00:43:17.378000 audit: BPF prog-id=37 op=UNLOAD May 17 00:43:17.378000 audit: BPF prog-id=38 op=UNLOAD May 17 00:43:17.398545 systemd[1]: Started kubelet.service. May 17 00:43:17.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:17.404544 systemd[1]: Stopping kubelet.service... May 17 00:43:17.404921 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:43:17.405126 systemd[1]: Stopped kubelet.service. May 17 00:43:17.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:17.407351 systemd[1]: Starting kubelet.service... May 17 00:43:17.540785 systemd[1]: Started kubelet.service. May 17 00:43:17.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:17.604742 kubelet[1590]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:17.605277 kubelet[1590]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:43:17.605384 kubelet[1590]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:17.605600 kubelet[1590]: I0517 00:43:17.605565 1590 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:43:18.037768 kubelet[1590]: I0517 00:43:18.037601 1590 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:43:18.037993 kubelet[1590]: I0517 00:43:18.037968 1590 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:43:18.038781 kubelet[1590]: I0517 00:43:18.038746 1590 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:43:18.089163 kubelet[1590]: E0517 00:43:18.089102 1590 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://134.199.236.151:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:18.089842 kubelet[1590]: I0517 00:43:18.089806 1590 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:43:18.103432 kubelet[1590]: E0517 00:43:18.103360 1590 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:43:18.103432 kubelet[1590]: I0517 00:43:18.103418 1590 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:43:18.108952 kubelet[1590]: I0517 00:43:18.108909 1590 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:43:18.109594 kubelet[1590]: I0517 00:43:18.109528 1590 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:43:18.110077 kubelet[1590]: I0517 00:43:18.109760 1590 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-f9c20123e0","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:43:18.111429 kubelet[1590]: I0517 00:43:18.111393 1590 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:43:18.111604 kubelet[1590]: I0517 00:43:18.111584 1590 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:43:18.111961 kubelet[1590]: I0517 00:43:18.111935 1590 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:18.117747 kubelet[1590]: I0517 00:43:18.117693 1590 kubelet.go:446] "Attempting to sync node with API server" May 17 00:43:18.118076 kubelet[1590]: I0517 00:43:18.118047 1590 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:43:18.118297 kubelet[1590]: I0517 00:43:18.118263 1590 kubelet.go:352] "Adding apiserver pod source" May 17 00:43:18.118429 kubelet[1590]: I0517 00:43:18.118411 1590 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:43:18.126148 kubelet[1590]: I0517 00:43:18.126109 1590 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:43:18.126758 kubelet[1590]: I0517 00:43:18.126722 1590 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:43:18.127547 kubelet[1590]: W0517 00:43:18.127511 1590 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:43:18.132493 kubelet[1590]: I0517 00:43:18.132431 1590 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:43:18.132493 kubelet[1590]: I0517 00:43:18.132500 1590 server.go:1287] "Started kubelet" May 17 00:43:18.132770 kubelet[1590]: W0517 00:43:18.132713 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://134.199.236.151:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f9c20123e0&limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:18.132851 kubelet[1590]: E0517 00:43:18.132779 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://134.199.236.151:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f9c20123e0&limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:18.148346 kubelet[1590]: W0517 00:43:18.148271 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://134.199.236.151:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:18.148568 kubelet[1590]: E0517 00:43:18.148546 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://134.199.236.151:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:18.148720 kubelet[1590]: I0517 00:43:18.148684 1590 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:43:18.149000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:18.149000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:18.149000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab1d10 a1=c000acec00 a2=c000ab1ce0 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.151712 kubelet[1590]: I0517 00:43:18.151674 1590 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:43:18.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:18.150000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:18.150000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:18.151977 kubelet[1590]: I0517 00:43:18.151882 1590 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:43:18.150000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad0720 a1=c000acec18 a2=c000ab1da0 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:18.152171 kubelet[1590]: I0517 00:43:18.152153 1590 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:43:18.152314 kubelet[1590]: I0517 00:43:18.152280 1590 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:43:18.152412 kubelet[1590]: I0517 00:43:18.152395 1590 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:43:18.154730 kubelet[1590]: E0517 00:43:18.153171 1590 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://134.199.236.151:6443/api/v1/namespaces/default/events\": dial tcp 134.199.236.151:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-f9c20123e0.184029c8df1250c1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-f9c20123e0,UID:ci-3510.3.7-n-f9c20123e0,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-f9c20123e0,},FirstTimestamp:2025-05-17 00:43:18.132469953 +0000 UTC m=+0.581897526,LastTimestamp:2025-05-17 00:43:18.132469953 +0000 UTC m=+0.581897526,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-f9c20123e0,}" May 17 00:43:18.157197 kubelet[1590]: I0517 00:43:18.157157 1590 server.go:479] "Adding debug handlers to kubelet server" May 17 00:43:18.156000 audit[1602]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.156000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd272d9630 a2=0 a3=7ffd272d961c items=0 ppid=1590 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:43:18.158617 kubelet[1590]: I0517 00:43:18.158580 1590 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:43:18.157000 audit[1603]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1603 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.157000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc63d2c1e0 a2=0 a3=7ffc63d2c1cc items=0 ppid=1590 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:43:18.160938 kubelet[1590]: I0517 00:43:18.160912 1590 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:43:18.161448 kubelet[1590]: E0517 00:43:18.161418 1590 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" May 17 00:43:18.162000 audit[1605]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.162000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd0959750 a2=0 a3=7ffdd095973c items=0 ppid=1590 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:18.164183 kubelet[1590]: E0517 00:43:18.164155 1590 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:43:18.164402 kubelet[1590]: E0517 00:43:18.164357 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://134.199.236.151:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f9c20123e0?timeout=10s\": dial tcp 134.199.236.151:6443: connect: connection refused" interval="200ms" May 17 00:43:18.165132 kubelet[1590]: I0517 00:43:18.165104 1590 factory.go:221] Registration of the systemd container factory successfully May 17 00:43:18.165248 kubelet[1590]: I0517 00:43:18.165211 1590 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:43:18.166807 kubelet[1590]: I0517 00:43:18.166759 1590 reconciler.go:26] "Reconciler: start to sync state" May 17 00:43:18.167026 kubelet[1590]: I0517 00:43:18.166827 1590 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:43:18.167401 kubelet[1590]: W0517 00:43:18.167344 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://134.199.236.151:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:18.167491 kubelet[1590]: E0517 00:43:18.167413 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://134.199.236.151:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:18.167595 kubelet[1590]: I0517 00:43:18.167575 1590 factory.go:221] Registration of the containerd container factory successfully May 17 00:43:18.167000 audit[1607]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.167000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed6836160 a2=0 a3=7ffed683614c items=0 ppid=1590 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:18.181000 audit[1610]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.181000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc1af3b750 a2=0 a3=7ffc1af3b73c items=0 ppid=1590 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:43:18.183889 kubelet[1590]: I0517 00:43:18.183849 1590 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:43:18.184000 audit[1612]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:18.184000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcec25d550 a2=0 a3=7ffcec25d53c items=0 ppid=1590 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:43:18.185775 kubelet[1590]: I0517 00:43:18.185746 1590 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:43:18.185881 kubelet[1590]: I0517 00:43:18.185868 1590 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:43:18.185969 kubelet[1590]: I0517 00:43:18.185958 1590 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:43:18.186025 kubelet[1590]: I0517 00:43:18.186015 1590 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:43:18.186240 kubelet[1590]: E0517 00:43:18.186211 1590 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:43:18.186000 audit[1613]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.186000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaf19f560 a2=0 a3=7ffeaf19f54c items=0 ppid=1590 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:43:18.187000 audit[1614]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.187000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe73799180 a2=0 a3=7ffe7379916c items=0 ppid=1590 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:43:18.189000 audit[1615]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:18.189000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd22539b00 a2=0 a3=7ffd22539aec items=0 ppid=1590 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:43:18.190000 audit[1616]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:18.190000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda762dae0 a2=0 a3=7ffda762dacc items=0 ppid=1590 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:43:18.196029 kubelet[1590]: W0517 00:43:18.195953 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://134.199.236.151:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:18.196278 kubelet[1590]: E0517 00:43:18.196257 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://134.199.236.151:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:18.197000 audit[1619]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:18.197000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe70634250 a2=0 a3=7ffe7063423c items=0 ppid=1590 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:43:18.199671 kubelet[1590]: I0517 00:43:18.199641 1590 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:43:18.199671 kubelet[1590]: I0517 00:43:18.199667 1590 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:43:18.199834 kubelet[1590]: I0517 00:43:18.199703 1590 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:18.200000 audit[1620]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:18.200000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc876f6f70 a2=0 a3=7ffc876f6f5c items=0 ppid=1590 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.201934 kubelet[1590]: I0517 00:43:18.201720 1590 policy_none.go:49] "None policy: Start" May 17 00:43:18.201934 kubelet[1590]: I0517 00:43:18.201753 1590 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:43:18.201934 kubelet[1590]: I0517 00:43:18.201777 1590 state_mem.go:35] "Initializing new in-memory state store" May 17 00:43:18.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:43:18.208110 systemd[1]: Created slice kubepods.slice. May 17 00:43:18.214693 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:43:18.218891 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:43:18.232532 kubelet[1590]: I0517 00:43:18.232490 1590 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:43:18.232000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:18.232000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:18.232000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea60f0 a1=c000ec8060 a2=c000ea60c0 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:18.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:18.233266 kubelet[1590]: I0517 00:43:18.232590 1590 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:43:18.233266 kubelet[1590]: I0517 00:43:18.232743 1590 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:43:18.233266 kubelet[1590]: I0517 00:43:18.232756 1590 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:43:18.234655 kubelet[1590]: I0517 00:43:18.233654 1590 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:43:18.235255 kubelet[1590]: E0517 00:43:18.235145 1590 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:43:18.235255 kubelet[1590]: E0517 00:43:18.235191 1590 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-f9c20123e0\" not found" May 17 00:43:18.298302 systemd[1]: Created slice kubepods-burstable-poda917a19546a5396d05f670bd9052ba4c.slice. May 17 00:43:18.308421 kubelet[1590]: E0517 00:43:18.308370 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.312034 systemd[1]: Created slice kubepods-burstable-podde0626dc6a3c0c386f936a0f3bbd750b.slice. May 17 00:43:18.322827 kubelet[1590]: E0517 00:43:18.322539 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.325112 systemd[1]: Created slice kubepods-burstable-pod3a729c247befd1148db8620d96ad23a3.slice. May 17 00:43:18.327204 kubelet[1590]: E0517 00:43:18.327166 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.334544 kubelet[1590]: I0517 00:43:18.334498 1590 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.335396 kubelet[1590]: E0517 00:43:18.335359 1590 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://134.199.236.151:6443/api/v1/nodes\": dial tcp 134.199.236.151:6443: connect: connection refused" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.365343 kubelet[1590]: E0517 00:43:18.365248 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://134.199.236.151:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f9c20123e0?timeout=10s\": dial tcp 134.199.236.151:6443: connect: connection refused" interval="400ms" May 17 00:43:18.468499 kubelet[1590]: I0517 00:43:18.468442 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.468809 kubelet[1590]: I0517 00:43:18.468782 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.468915 kubelet[1590]: I0517 00:43:18.468894 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469002 kubelet[1590]: I0517 00:43:18.468988 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469090 kubelet[1590]: I0517 00:43:18.469075 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469172 kubelet[1590]: I0517 00:43:18.469158 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a729c247befd1148db8620d96ad23a3-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-f9c20123e0\" (UID: \"3a729c247befd1148db8620d96ad23a3\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469246 kubelet[1590]: I0517 00:43:18.469233 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469399 kubelet[1590]: I0517 00:43:18.469362 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.469656 kubelet[1590]: I0517 00:43:18.469625 1590 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.537798 kubelet[1590]: I0517 00:43:18.537753 1590 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.538196 kubelet[1590]: E0517 00:43:18.538141 1590 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://134.199.236.151:6443/api/v1/nodes\": dial tcp 134.199.236.151:6443: connect: connection refused" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.611418 kubelet[1590]: E0517 00:43:18.610376 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:18.613069 env[1190]: time="2025-05-17T00:43:18.612999175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-f9c20123e0,Uid:a917a19546a5396d05f670bd9052ba4c,Namespace:kube-system,Attempt:0,}" May 17 00:43:18.623471 kubelet[1590]: E0517 00:43:18.623423 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:18.624702 env[1190]: time="2025-05-17T00:43:18.624620677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-f9c20123e0,Uid:de0626dc6a3c0c386f936a0f3bbd750b,Namespace:kube-system,Attempt:0,}" May 17 00:43:18.629235 kubelet[1590]: E0517 00:43:18.629183 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:18.630428 env[1190]: time="2025-05-17T00:43:18.630365705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-f9c20123e0,Uid:3a729c247befd1148db8620d96ad23a3,Namespace:kube-system,Attempt:0,}" May 17 00:43:18.766106 kubelet[1590]: E0517 00:43:18.766049 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://134.199.236.151:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f9c20123e0?timeout=10s\": dial tcp 134.199.236.151:6443: connect: connection refused" interval="800ms" May 17 00:43:18.940073 kubelet[1590]: I0517 00:43:18.939959 1590 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:18.940696 kubelet[1590]: E0517 00:43:18.940649 1590 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://134.199.236.151:6443/api/v1/nodes\": dial tcp 134.199.236.151:6443: connect: connection refused" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:19.052248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2368965777.mount: Deactivated successfully. May 17 00:43:19.057869 env[1190]: time="2025-05-17T00:43:19.057796432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.060211 env[1190]: time="2025-05-17T00:43:19.060165077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.061902 env[1190]: time="2025-05-17T00:43:19.061854789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.064317 env[1190]: time="2025-05-17T00:43:19.064245344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.067066 env[1190]: time="2025-05-17T00:43:19.067007556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.071627 env[1190]: time="2025-05-17T00:43:19.071574587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.077347 env[1190]: time="2025-05-17T00:43:19.077298352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.081544 env[1190]: time="2025-05-17T00:43:19.081495157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.082172 env[1190]: time="2025-05-17T00:43:19.082133618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.082832 env[1190]: time="2025-05-17T00:43:19.082800452Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.083608 env[1190]: time="2025-05-17T00:43:19.083574360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.084451 env[1190]: time="2025-05-17T00:43:19.084415702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:19.113294 env[1190]: time="2025-05-17T00:43:19.113156561Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:19.113513 env[1190]: time="2025-05-17T00:43:19.113484054Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:19.113641 env[1190]: time="2025-05-17T00:43:19.113618146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:19.113975 env[1190]: time="2025-05-17T00:43:19.113924669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58bd180349e57886d9fdfdaf3e548fca154af1e7ef849b454ccdc4a8462e6279 pid=1629 runtime=io.containerd.runc.v2 May 17 00:43:19.123903 env[1190]: time="2025-05-17T00:43:19.123804358Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:19.123903 env[1190]: time="2025-05-17T00:43:19.123867797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:19.124179 env[1190]: time="2025-05-17T00:43:19.123878583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:19.124179 env[1190]: time="2025-05-17T00:43:19.124017800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06adbedc9acfa8248bef7ca7521b608759b204571e3ac503f4e4f79dbb5b0bea pid=1655 runtime=io.containerd.runc.v2 May 17 00:43:19.127853 kubelet[1590]: W0517 00:43:19.127708 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://134.199.236.151:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:19.127853 kubelet[1590]: E0517 00:43:19.127781 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://134.199.236.151:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:19.131959 env[1190]: time="2025-05-17T00:43:19.131852548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:19.132250 env[1190]: time="2025-05-17T00:43:19.132217868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:19.132377 env[1190]: time="2025-05-17T00:43:19.132355075Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:19.132738 env[1190]: time="2025-05-17T00:43:19.132688773Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a55fd9fb53674a2711645f580b9ae2655aed536e873d065562eda0bd8a065e99 pid=1652 runtime=io.containerd.runc.v2 May 17 00:43:19.151742 systemd[1]: Started cri-containerd-58bd180349e57886d9fdfdaf3e548fca154af1e7ef849b454ccdc4a8462e6279.scope. May 17 00:43:19.165299 systemd[1]: Started cri-containerd-06adbedc9acfa8248bef7ca7521b608759b204571e3ac503f4e4f79dbb5b0bea.scope. May 17 00:43:19.179924 systemd[1]: Started cri-containerd-a55fd9fb53674a2711645f580b9ae2655aed536e873d065562eda0bd8a065e99.scope. May 17 00:43:19.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.181000 audit: BPF prog-id=61 op=LOAD May 17 00:43:19.188000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.188000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1629 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626431383033343965353738383664396664666461663365353438 May 17 00:43:19.188000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.188000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1629 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626431383033343965353738383664396664666461663365353438 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.190000 audit: BPF prog-id=62 op=LOAD May 17 00:43:19.190000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000904e0 items=0 ppid=1629 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626431383033343965353738383664396664666461663365353438 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.191000 audit: BPF prog-id=63 op=LOAD May 17 00:43:19.191000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000090528 items=0 ppid=1629 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626431383033343965353738383664396664666461663365353438 May 17 00:43:19.192000 audit: BPF prog-id=63 op=UNLOAD May 17 00:43:19.192000 audit: BPF prog-id=62 op=UNLOAD May 17 00:43:19.192000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.192000 audit: BPF prog-id=64 op=LOAD May 17 00:43:19.192000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000090938 items=0 ppid=1629 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626431383033343965353738383664396664666461663365353438 May 17 00:43:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.209000 audit: BPF prog-id=65 op=LOAD May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616462656463396163666138323438626566376361373532316236 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616462656463396163666138323438626566376361373532316236 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit: BPF prog-id=66 op=LOAD May 17 00:43:19.210000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000214910 items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616462656463396163666138323438626566376361373532316236 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit: BPF prog-id=67 op=LOAD May 17 00:43:19.210000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000214958 items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616462656463396163666138323438626566376361373532316236 May 17 00:43:19.210000 audit: BPF prog-id=67 op=UNLOAD May 17 00:43:19.210000 audit: BPF prog-id=66 op=UNLOAD May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.210000 audit: BPF prog-id=68 op=LOAD May 17 00:43:19.210000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000214d68 items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616462656463396163666138323438626566376361373532316236 May 17 00:43:19.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit: BPF prog-id=69 op=LOAD May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1652 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356664396662353336373461323731313634356635383062396165 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1652 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356664396662353336373461323731313634356635383062396165 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit: BPF prog-id=70 op=LOAD May 17 00:43:19.215000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002daf10 items=0 ppid=1652 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356664396662353336373461323731313634356635383062396165 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.215000 audit: BPF prog-id=71 op=LOAD May 17 00:43:19.215000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002daf58 items=0 ppid=1652 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356664396662353336373461323731313634356635383062396165 May 17 00:43:19.215000 audit: BPF prog-id=71 op=UNLOAD May 17 00:43:19.215000 audit: BPF prog-id=70 op=UNLOAD May 17 00:43:19.216000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.216000 audit: BPF prog-id=72 op=LOAD May 17 00:43:19.216000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002db368 items=0 ppid=1652 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356664396662353336373461323731313634356635383062396165 May 17 00:43:19.256492 kubelet[1590]: W0517 00:43:19.256381 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://134.199.236.151:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:19.256492 kubelet[1590]: E0517 00:43:19.256457 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://134.199.236.151:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:19.263345 env[1190]: time="2025-05-17T00:43:19.261783966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-f9c20123e0,Uid:de0626dc6a3c0c386f936a0f3bbd750b,Namespace:kube-system,Attempt:0,} returns sandbox id \"06adbedc9acfa8248bef7ca7521b608759b204571e3ac503f4e4f79dbb5b0bea\"" May 17 00:43:19.263898 kubelet[1590]: E0517 00:43:19.263875 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:19.266330 env[1190]: time="2025-05-17T00:43:19.266268930Z" level=info msg="CreateContainer within sandbox \"06adbedc9acfa8248bef7ca7521b608759b204571e3ac503f4e4f79dbb5b0bea\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:43:19.272364 env[1190]: time="2025-05-17T00:43:19.272248440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-f9c20123e0,Uid:a917a19546a5396d05f670bd9052ba4c,Namespace:kube-system,Attempt:0,} returns sandbox id \"a55fd9fb53674a2711645f580b9ae2655aed536e873d065562eda0bd8a065e99\"" May 17 00:43:19.273326 kubelet[1590]: E0517 00:43:19.273143 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:19.274851 env[1190]: time="2025-05-17T00:43:19.274813894Z" level=info msg="CreateContainer within sandbox \"a55fd9fb53674a2711645f580b9ae2655aed536e873d065562eda0bd8a065e99\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:43:19.281768 env[1190]: time="2025-05-17T00:43:19.281712593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-f9c20123e0,Uid:3a729c247befd1148db8620d96ad23a3,Namespace:kube-system,Attempt:0,} returns sandbox id \"58bd180349e57886d9fdfdaf3e548fca154af1e7ef849b454ccdc4a8462e6279\"" May 17 00:43:19.282803 kubelet[1590]: E0517 00:43:19.282648 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:19.285559 env[1190]: time="2025-05-17T00:43:19.285519559Z" level=info msg="CreateContainer within sandbox \"58bd180349e57886d9fdfdaf3e548fca154af1e7ef849b454ccdc4a8462e6279\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:43:19.286050 env[1190]: time="2025-05-17T00:43:19.286022206Z" level=info msg="CreateContainer within sandbox \"06adbedc9acfa8248bef7ca7521b608759b204571e3ac503f4e4f79dbb5b0bea\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6c27b456fd4f33b502f623bb11e757cf4919d22071b84076803ca03affb67996\"" May 17 00:43:19.286780 env[1190]: time="2025-05-17T00:43:19.286755150Z" level=info msg="StartContainer for \"6c27b456fd4f33b502f623bb11e757cf4919d22071b84076803ca03affb67996\"" May 17 00:43:19.288402 env[1190]: time="2025-05-17T00:43:19.288369411Z" level=info msg="CreateContainer within sandbox \"a55fd9fb53674a2711645f580b9ae2655aed536e873d065562eda0bd8a065e99\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f124185a94eebd1e599409ab9f1c9de4178ff9dff0f68d42841222b06b38d7cb\"" May 17 00:43:19.288764 env[1190]: time="2025-05-17T00:43:19.288740671Z" level=info msg="StartContainer for \"f124185a94eebd1e599409ab9f1c9de4178ff9dff0f68d42841222b06b38d7cb\"" May 17 00:43:19.297251 env[1190]: time="2025-05-17T00:43:19.297190141Z" level=info msg="CreateContainer within sandbox \"58bd180349e57886d9fdfdaf3e548fca154af1e7ef849b454ccdc4a8462e6279\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d76daaa55b7c0ffdce0a93145ba374c9745fa53be3feb738bfe351be83dd2508\"" May 17 00:43:19.297937 env[1190]: time="2025-05-17T00:43:19.297900157Z" level=info msg="StartContainer for \"d76daaa55b7c0ffdce0a93145ba374c9745fa53be3feb738bfe351be83dd2508\"" May 17 00:43:19.316971 systemd[1]: Started cri-containerd-6c27b456fd4f33b502f623bb11e757cf4919d22071b84076803ca03affb67996.scope. May 17 00:43:19.323245 systemd[1]: Started cri-containerd-d76daaa55b7c0ffdce0a93145ba374c9745fa53be3feb738bfe351be83dd2508.scope. May 17 00:43:19.334109 kubelet[1590]: W0517 00:43:19.333835 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://134.199.236.151:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f9c20123e0&limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:19.334109 kubelet[1590]: E0517 00:43:19.333908 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://134.199.236.151:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-f9c20123e0&limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:19.335725 systemd[1]: Started cri-containerd-f124185a94eebd1e599409ab9f1c9de4178ff9dff0f68d42841222b06b38d7cb.scope. May 17 00:43:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.351000 audit: BPF prog-id=73 op=LOAD May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323762343536666434663333623530326636323362623131653735 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323762343536666434663333623530326636323362623131653735 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit: BPF prog-id=74 op=LOAD May 17 00:43:19.352000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000305a10 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323762343536666434663333623530326636323362623131653735 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit: BPF prog-id=75 op=LOAD May 17 00:43:19.352000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000305a58 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323762343536666434663333623530326636323362623131653735 May 17 00:43:19.352000 audit: BPF prog-id=75 op=UNLOAD May 17 00:43:19.352000 audit: BPF prog-id=74 op=UNLOAD May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.352000 audit: BPF prog-id=76 op=LOAD May 17 00:43:19.352000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000305e68 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323762343536666434663333623530326636323362623131653735 May 17 00:43:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit: BPF prog-id=77 op=LOAD May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1652 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323431383561393465656264316535393934303961623966316339 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1652 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323431383561393465656264316535393934303961623966316339 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit: BPF prog-id=78 op=LOAD May 17 00:43:19.371000 audit[1765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000383dc0 items=0 ppid=1652 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323431383561393465656264316535393934303961623966316339 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.371000 audit: BPF prog-id=79 op=LOAD May 17 00:43:19.371000 audit[1765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000383e08 items=0 ppid=1652 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323431383561393465656264316535393934303961623966316339 May 17 00:43:19.372000 audit: BPF prog-id=79 op=UNLOAD May 17 00:43:19.372000 audit: BPF prog-id=78 op=UNLOAD May 17 00:43:19.372000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { perfmon } for pid=1765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit[1765]: AVC avc: denied { bpf } for pid=1765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.372000 audit: BPF prog-id=80 op=LOAD May 17 00:43:19.372000 audit[1765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e2218 items=0 ppid=1652 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323431383561393465656264316535393934303961623966316339 May 17 00:43:19.397693 env[1190]: time="2025-05-17T00:43:19.397633932Z" level=info msg="StartContainer for \"6c27b456fd4f33b502f623bb11e757cf4919d22071b84076803ca03affb67996\" returns successfully" May 17 00:43:19.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.413000 audit: BPF prog-id=81 op=LOAD May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1629 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366461616135356237633066666463653061393331343562613337 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1629 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366461616135356237633066666463653061393331343562613337 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.414000 audit: BPF prog-id=82 op=LOAD May 17 00:43:19.414000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c31d0 items=0 ppid=1629 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366461616135356237633066666463653061393331343562613337 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.415000 audit: BPF prog-id=83 op=LOAD May 17 00:43:19.415000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c3218 items=0 ppid=1629 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366461616135356237633066666463653061393331343562613337 May 17 00:43:19.416000 audit: BPF prog-id=83 op=UNLOAD May 17 00:43:19.416000 audit: BPF prog-id=82 op=UNLOAD May 17 00:43:19.416000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:19.416000 audit: BPF prog-id=84 op=LOAD May 17 00:43:19.416000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c3628 items=0 ppid=1629 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366461616135356237633066666463653061393331343562613337 May 17 00:43:19.431811 env[1190]: time="2025-05-17T00:43:19.431736077Z" level=info msg="StartContainer for \"f124185a94eebd1e599409ab9f1c9de4178ff9dff0f68d42841222b06b38d7cb\" returns successfully" May 17 00:43:19.473170 env[1190]: time="2025-05-17T00:43:19.473031693Z" level=info msg="StartContainer for \"d76daaa55b7c0ffdce0a93145ba374c9745fa53be3feb738bfe351be83dd2508\" returns successfully" May 17 00:43:19.567864 kubelet[1590]: E0517 00:43:19.567813 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://134.199.236.151:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-f9c20123e0?timeout=10s\": dial tcp 134.199.236.151:6443: connect: connection refused" interval="1.6s" May 17 00:43:19.578572 kubelet[1590]: W0517 00:43:19.578495 1590 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://134.199.236.151:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 134.199.236.151:6443: connect: connection refused May 17 00:43:19.578572 kubelet[1590]: E0517 00:43:19.578572 1590 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://134.199.236.151:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 134.199.236.151:6443: connect: connection refused" logger="UnhandledError" May 17 00:43:19.742101 kubelet[1590]: I0517 00:43:19.741909 1590 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:19.742696 kubelet[1590]: E0517 00:43:19.742255 1590 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://134.199.236.151:6443/api/v1/nodes\": dial tcp 134.199.236.151:6443: connect: connection refused" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:20.203606 kubelet[1590]: E0517 00:43:20.203194 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:20.203606 kubelet[1590]: E0517 00:43:20.203353 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:20.205695 kubelet[1590]: E0517 00:43:20.205662 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:20.206045 kubelet[1590]: E0517 00:43:20.206023 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:20.208133 kubelet[1590]: E0517 00:43:20.208108 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:20.208502 kubelet[1590]: E0517 00:43:20.208485 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:20.343000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:20.343000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:20.343000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003fe200 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:20.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:20.343000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000595950 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:20.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:21.196000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.196000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003d6ff80 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.196000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.196000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c00876dc00 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.201000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.201000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0087d2f00 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.201000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.204000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526386 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.204000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c000e4f770 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.210005 kubelet[1590]: E0517 00:43:21.209969 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.210468 kubelet[1590]: E0517 00:43:21.210136 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:21.210468 kubelet[1590]: E0517 00:43:21.210441 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.210554 kubelet[1590]: E0517 00:43:21.210531 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:21.210795 kubelet[1590]: E0517 00:43:21.210773 1590 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.210911 kubelet[1590]: E0517 00:43:21.210894 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:21.243000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.243000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0034ca960 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.243000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:21.243000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006e7b3b0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:43:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:21.266387 kubelet[1590]: E0517 00:43:21.266334 1590 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-f9c20123e0\" not found" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.344360 kubelet[1590]: I0517 00:43:21.344314 1590 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.357937 kubelet[1590]: I0517 00:43:21.357867 1590 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.357937 kubelet[1590]: E0517 00:43:21.357945 1590 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-f9c20123e0\": node \"ci-3510.3.7-n-f9c20123e0\" not found" May 17 00:43:21.372079 kubelet[1590]: E0517 00:43:21.372036 1590 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" May 17 00:43:21.462617 kubelet[1590]: I0517 00:43:21.462463 1590 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.469172 kubelet[1590]: E0517 00:43:21.469098 1590 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.469443 kubelet[1590]: I0517 00:43:21.469423 1590 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.471996 kubelet[1590]: E0517 00:43:21.471957 1590 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.472235 kubelet[1590]: I0517 00:43:21.472218 1590 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" May 17 00:43:21.476247 kubelet[1590]: E0517 00:43:21.476207 1590 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-f9c20123e0\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" May 17 00:43:22.148114 kubelet[1590]: I0517 00:43:22.148052 1590 apiserver.go:52] "Watching apiserver" May 17 00:43:22.167124 kubelet[1590]: I0517 00:43:22.167047 1590 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:43:23.511978 systemd[1]: Reloading. May 17 00:43:23.547831 kubelet[1590]: I0517 00:43:23.542720 1590 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:23.555076 kubelet[1590]: W0517 00:43:23.555035 1590 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:43:23.555675 kubelet[1590]: E0517 00:43:23.555643 1590 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:23.606906 /usr/lib/systemd/system-generators/torcx-generator[1879]: time="2025-05-17T00:43:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:43:23.606933 /usr/lib/systemd/system-generators/torcx-generator[1879]: time="2025-05-17T00:43:23Z" level=info msg="torcx already run" May 17 00:43:23.705621 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:43:23.705643 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:43:23.725952 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:43:23.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.816225 kernel: kauditd_printk_skb: 599 callbacks suppressed May 17 00:43:23.816373 kernel: audit: type=1400 audit(1747442603.813:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.816410 kernel: audit: type=1400 audit(1747442603.813:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.827329 kernel: audit: type=1400 audit(1747442603.818:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.827472 kernel: audit: type=1400 audit(1747442603.818:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.827509 kernel: audit: type=1400 audit(1747442603.818:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.827535 kernel: audit: type=1400 audit(1747442603.818:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.828441 kernel: audit: type=1400 audit(1747442603.818:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.830715 kernel: audit: type=1400 audit(1747442603.818:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.833313 kernel: audit: type=1400 audit(1747442603.818:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.838302 kernel: audit: type=1400 audit(1747442603.821:580): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit: BPF prog-id=85 op=LOAD May 17 00:43:23.821000 audit: BPF prog-id=46 op=UNLOAD May 17 00:43:23.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit: BPF prog-id=86 op=LOAD May 17 00:43:23.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit: BPF prog-id=87 op=LOAD May 17 00:43:23.826000 audit: BPF prog-id=47 op=UNLOAD May 17 00:43:23.826000 audit: BPF prog-id=48 op=UNLOAD May 17 00:43:23.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit: BPF prog-id=88 op=LOAD May 17 00:43:23.835000 audit: BPF prog-id=49 op=UNLOAD May 17 00:43:23.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit: BPF prog-id=89 op=LOAD May 17 00:43:23.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.840000 audit: BPF prog-id=90 op=LOAD May 17 00:43:23.841000 audit: BPF prog-id=50 op=UNLOAD May 17 00:43:23.841000 audit: BPF prog-id=51 op=UNLOAD May 17 00:43:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.843000 audit: BPF prog-id=91 op=LOAD May 17 00:43:23.843000 audit: BPF prog-id=52 op=UNLOAD May 17 00:43:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.844000 audit: BPF prog-id=92 op=LOAD May 17 00:43:23.845000 audit: BPF prog-id=77 op=UNLOAD May 17 00:43:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.847000 audit: BPF prog-id=93 op=LOAD May 17 00:43:23.847000 audit: BPF prog-id=73 op=UNLOAD May 17 00:43:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.849000 audit: BPF prog-id=94 op=LOAD May 17 00:43:23.849000 audit: BPF prog-id=69 op=UNLOAD May 17 00:43:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.850000 audit: BPF prog-id=95 op=LOAD May 17 00:43:23.851000 audit: BPF prog-id=61 op=UNLOAD May 17 00:43:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.852000 audit: BPF prog-id=96 op=LOAD May 17 00:43:23.852000 audit: BPF prog-id=53 op=UNLOAD May 17 00:43:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.854000 audit: BPF prog-id=97 op=LOAD May 17 00:43:23.855000 audit: BPF prog-id=65 op=UNLOAD May 17 00:43:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.856000 audit: BPF prog-id=98 op=LOAD May 17 00:43:23.856000 audit: BPF prog-id=54 op=UNLOAD May 17 00:43:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.858000 audit: BPF prog-id=99 op=LOAD May 17 00:43:23.858000 audit: BPF prog-id=81 op=UNLOAD May 17 00:43:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.860000 audit: BPF prog-id=100 op=LOAD May 17 00:43:23.861000 audit: BPF prog-id=55 op=UNLOAD May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit: BPF prog-id=101 op=LOAD May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit: BPF prog-id=102 op=LOAD May 17 00:43:23.862000 audit: BPF prog-id=56 op=UNLOAD May 17 00:43:23.862000 audit: BPF prog-id=57 op=UNLOAD May 17 00:43:23.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit: BPF prog-id=103 op=LOAD May 17 00:43:23.863000 audit: BPF prog-id=58 op=UNLOAD May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit: BPF prog-id=104 op=LOAD May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.864000 audit: BPF prog-id=105 op=LOAD May 17 00:43:23.864000 audit: BPF prog-id=59 op=UNLOAD May 17 00:43:23.864000 audit: BPF prog-id=60 op=UNLOAD May 17 00:43:23.888923 systemd[1]: Stopping kubelet.service... May 17 00:43:23.913690 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:43:23.913962 systemd[1]: Stopped kubelet.service. May 17 00:43:23.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:23.916298 systemd[1]: Starting kubelet.service... May 17 00:43:24.929647 systemd[1]: Started kubelet.service. May 17 00:43:24.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:25.023905 kubelet[1930]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:25.023905 kubelet[1930]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:43:25.023905 kubelet[1930]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:25.023905 kubelet[1930]: I0517 00:43:25.023664 1930 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:43:25.037931 kubelet[1930]: I0517 00:43:25.037476 1930 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:43:25.037931 kubelet[1930]: I0517 00:43:25.037578 1930 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:43:25.039586 kubelet[1930]: I0517 00:43:25.038647 1930 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:43:25.044680 kubelet[1930]: I0517 00:43:25.044248 1930 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:43:25.048155 kubelet[1930]: I0517 00:43:25.048089 1930 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:43:25.070439 kubelet[1930]: E0517 00:43:25.069535 1930 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:43:25.070439 kubelet[1930]: I0517 00:43:25.069605 1930 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:43:25.072847 kubelet[1930]: I0517 00:43:25.072780 1930 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:43:25.074903 kubelet[1930]: I0517 00:43:25.073033 1930 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:43:25.074903 kubelet[1930]: I0517 00:43:25.073085 1930 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-f9c20123e0","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:43:25.074903 kubelet[1930]: I0517 00:43:25.073378 1930 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:43:25.074903 kubelet[1930]: I0517 00:43:25.073390 1930 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.073456 1930 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.073660 1930 kubelet.go:446] "Attempting to sync node with API server" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.073682 1930 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.073723 1930 kubelet.go:352] "Adding apiserver pod source" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.073736 1930 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:43:25.075380 kubelet[1930]: I0517 00:43:25.075091 1930 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:43:25.077038 kubelet[1930]: I0517 00:43:25.075992 1930 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:43:25.077434 kubelet[1930]: I0517 00:43:25.077259 1930 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:43:25.081231 kubelet[1930]: I0517 00:43:25.080351 1930 server.go:1287] "Started kubelet" May 17 00:43:25.086193 kubelet[1930]: I0517 00:43:25.086127 1930 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:43:25.090635 kubelet[1930]: I0517 00:43:25.089950 1930 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:43:25.090635 kubelet[1930]: I0517 00:43:25.090531 1930 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:43:25.099000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:25.099000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:25.099000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bed1d0 a1=c000befce0 a2=c000bed1a0 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.099000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:25.100000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:25.100000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:25.100000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bffe20 a1=c000befcf8 a2=c000bed260 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:25.114947 kubelet[1930]: I0517 00:43:25.100393 1930 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:43:25.114947 kubelet[1930]: I0517 00:43:25.100645 1930 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:43:25.114947 kubelet[1930]: I0517 00:43:25.100687 1930 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:43:25.114947 kubelet[1930]: I0517 00:43:25.109138 1930 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:43:25.114947 kubelet[1930]: I0517 00:43:25.111568 1930 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:43:25.114947 kubelet[1930]: E0517 00:43:25.112049 1930 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-f9c20123e0\" not found" May 17 00:43:25.115160 kubelet[1930]: I0517 00:43:25.115133 1930 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:43:25.117003 kubelet[1930]: I0517 00:43:25.115378 1930 reconciler.go:26] "Reconciler: start to sync state" May 17 00:43:25.123945 kubelet[1930]: I0517 00:43:25.123428 1930 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:43:25.127172 kubelet[1930]: I0517 00:43:25.126929 1930 server.go:479] "Adding debug handlers to kubelet server" May 17 00:43:25.137646 kubelet[1930]: I0517 00:43:25.137206 1930 factory.go:221] Registration of the containerd container factory successfully May 17 00:43:25.137646 kubelet[1930]: I0517 00:43:25.137224 1930 factory.go:221] Registration of the systemd container factory successfully May 17 00:43:25.137847 kubelet[1930]: I0517 00:43:25.137819 1930 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:43:25.137883 kubelet[1930]: I0517 00:43:25.137850 1930 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:43:25.137883 kubelet[1930]: I0517 00:43:25.137874 1930 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:43:25.137883 kubelet[1930]: I0517 00:43:25.137882 1930 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:43:25.137970 kubelet[1930]: E0517 00:43:25.137935 1930 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:43:25.146841 kubelet[1930]: I0517 00:43:25.143277 1930 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:43:25.233350 kubelet[1930]: I0517 00:43:25.233228 1930 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:43:25.233636 kubelet[1930]: I0517 00:43:25.233617 1930 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:43:25.233735 kubelet[1930]: I0517 00:43:25.233726 1930 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:25.234251 kubelet[1930]: I0517 00:43:25.234229 1930 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:43:25.234561 kubelet[1930]: I0517 00:43:25.234528 1930 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:43:25.234743 kubelet[1930]: I0517 00:43:25.234730 1930 policy_none.go:49] "None policy: Start" May 17 00:43:25.234871 kubelet[1930]: I0517 00:43:25.234858 1930 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:43:25.234975 kubelet[1930]: I0517 00:43:25.234964 1930 state_mem.go:35] "Initializing new in-memory state store" May 17 00:43:25.235388 kubelet[1930]: I0517 00:43:25.235277 1930 state_mem.go:75] "Updated machine memory state" May 17 00:43:25.238005 kubelet[1930]: E0517 00:43:25.237975 1930 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:43:25.240165 kubelet[1930]: I0517 00:43:25.240131 1930 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:43:25.238000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:25.238000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:25.238000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010f0180 a1=c001093188 a2=c0010f0150 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.238000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:25.240640 kubelet[1930]: I0517 00:43:25.240199 1930 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:43:25.240640 kubelet[1930]: I0517 00:43:25.240395 1930 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:43:25.240640 kubelet[1930]: I0517 00:43:25.240407 1930 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:43:25.241033 kubelet[1930]: I0517 00:43:25.241011 1930 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:43:25.242945 kubelet[1930]: E0517 00:43:25.242922 1930 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:43:25.356422 kubelet[1930]: I0517 00:43:25.356387 1930 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.371735 kubelet[1930]: I0517 00:43:25.371693 1930 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.372041 kubelet[1930]: I0517 00:43:25.372029 1930 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.439637 kubelet[1930]: I0517 00:43:25.439601 1930 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.440336 kubelet[1930]: I0517 00:43:25.440316 1930 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.440801 kubelet[1930]: I0517 00:43:25.440786 1930 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.454612 kubelet[1930]: W0517 00:43:25.454572 1930 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:43:25.455503 kubelet[1930]: W0517 00:43:25.455478 1930 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:43:25.459195 kubelet[1930]: W0517 00:43:25.459168 1930 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:43:25.459462 kubelet[1930]: E0517 00:43:25.459432 1930 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.518462 kubelet[1930]: I0517 00:43:25.518306 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.518835 kubelet[1930]: I0517 00:43:25.518787 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.518968 kubelet[1930]: I0517 00:43:25.518954 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519096 kubelet[1930]: I0517 00:43:25.519080 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519208 kubelet[1930]: I0517 00:43:25.519194 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a729c247befd1148db8620d96ad23a3-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-f9c20123e0\" (UID: \"3a729c247befd1148db8620d96ad23a3\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519334 kubelet[1930]: I0517 00:43:25.519320 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519478 kubelet[1930]: I0517 00:43:25.519460 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519672 kubelet[1930]: I0517 00:43:25.519633 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a917a19546a5396d05f670bd9052ba4c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" (UID: \"a917a19546a5396d05f670bd9052ba4c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.519793 kubelet[1930]: I0517 00:43:25.519780 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/de0626dc6a3c0c386f936a0f3bbd750b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-f9c20123e0\" (UID: \"de0626dc6a3c0c386f936a0f3bbd750b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" May 17 00:43:25.520000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:25.520000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007a40e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:25.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:25.521000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:25.521000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007a4300 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:25.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:25.523000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:25.523000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003da8e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:25.523000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:25.524000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:25.524000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003dace0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:25.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:25.755766 kubelet[1930]: E0517 00:43:25.755717 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:25.756301 kubelet[1930]: E0517 00:43:25.756269 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:25.760937 kubelet[1930]: E0517 00:43:25.760897 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:26.087203 kubelet[1930]: I0517 00:43:26.087158 1930 apiserver.go:52] "Watching apiserver" May 17 00:43:26.116777 kubelet[1930]: I0517 00:43:26.116741 1930 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:43:26.186935 kubelet[1930]: E0517 00:43:26.186900 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:26.187726 kubelet[1930]: E0517 00:43:26.187704 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:26.187975 kubelet[1930]: I0517 00:43:26.187950 1930 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:26.230617 kubelet[1930]: W0517 00:43:26.230561 1930 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:43:26.230946 kubelet[1930]: E0517 00:43:26.230925 1930 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-f9c20123e0\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" May 17 00:43:26.231255 kubelet[1930]: E0517 00:43:26.231241 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:26.256180 kubelet[1930]: I0517 00:43:26.256057 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-f9c20123e0" podStartSLOduration=3.256032708 podStartE2EDuration="3.256032708s" podCreationTimestamp="2025-05-17 00:43:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:43:26.255096129 +0000 UTC m=+1.315382925" watchObservedRunningTime="2025-05-17 00:43:26.256032708 +0000 UTC m=+1.316319507" May 17 00:43:26.256663 kubelet[1930]: I0517 00:43:26.256602 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-f9c20123e0" podStartSLOduration=1.25658319 podStartE2EDuration="1.25658319s" podCreationTimestamp="2025-05-17 00:43:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:43:26.24439286 +0000 UTC m=+1.304679666" watchObservedRunningTime="2025-05-17 00:43:26.25658319 +0000 UTC m=+1.316869996" May 17 00:43:26.281323 kubelet[1930]: I0517 00:43:26.281236 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-f9c20123e0" podStartSLOduration=1.281197882 podStartE2EDuration="1.281197882s" podCreationTimestamp="2025-05-17 00:43:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:43:26.266100171 +0000 UTC m=+1.326386976" watchObservedRunningTime="2025-05-17 00:43:26.281197882 +0000 UTC m=+1.341484688" May 17 00:43:26.919000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526411 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:43:26.919000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005ae640 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:43:26.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:27.188825 kubelet[1930]: E0517 00:43:27.188718 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:27.189387 kubelet[1930]: E0517 00:43:27.188790 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:30.105408 kubelet[1930]: I0517 00:43:30.105358 1930 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:43:30.105970 env[1190]: time="2025-05-17T00:43:30.105747394Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:43:30.106203 kubelet[1930]: I0517 00:43:30.106026 1930 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:43:30.856435 systemd[1]: Created slice kubepods-besteffort-pod63b326ce_70e5_46d4_88f5_2063e93f41f3.slice. May 17 00:43:30.955999 kubelet[1930]: I0517 00:43:30.955906 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/63b326ce-70e5-46d4-88f5-2063e93f41f3-xtables-lock\") pod \"kube-proxy-5vtq7\" (UID: \"63b326ce-70e5-46d4-88f5-2063e93f41f3\") " pod="kube-system/kube-proxy-5vtq7" May 17 00:43:30.955999 kubelet[1930]: I0517 00:43:30.955963 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/63b326ce-70e5-46d4-88f5-2063e93f41f3-kube-proxy\") pod \"kube-proxy-5vtq7\" (UID: \"63b326ce-70e5-46d4-88f5-2063e93f41f3\") " pod="kube-system/kube-proxy-5vtq7" May 17 00:43:30.955999 kubelet[1930]: I0517 00:43:30.955987 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/63b326ce-70e5-46d4-88f5-2063e93f41f3-lib-modules\") pod \"kube-proxy-5vtq7\" (UID: \"63b326ce-70e5-46d4-88f5-2063e93f41f3\") " pod="kube-system/kube-proxy-5vtq7" May 17 00:43:30.955999 kubelet[1930]: I0517 00:43:30.956004 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vckgb\" (UniqueName: \"kubernetes.io/projected/63b326ce-70e5-46d4-88f5-2063e93f41f3-kube-api-access-vckgb\") pod \"kube-proxy-5vtq7\" (UID: \"63b326ce-70e5-46d4-88f5-2063e93f41f3\") " pod="kube-system/kube-proxy-5vtq7" May 17 00:43:31.066221 kubelet[1930]: I0517 00:43:31.066158 1930 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:43:31.165959 kubelet[1930]: E0517 00:43:31.165831 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:31.166985 env[1190]: time="2025-05-17T00:43:31.166928210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5vtq7,Uid:63b326ce-70e5-46d4-88f5-2063e93f41f3,Namespace:kube-system,Attempt:0,}" May 17 00:43:31.189132 env[1190]: time="2025-05-17T00:43:31.189023903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:31.189363 env[1190]: time="2025-05-17T00:43:31.189145540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:31.189363 env[1190]: time="2025-05-17T00:43:31.189180284Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:31.189431 env[1190]: time="2025-05-17T00:43:31.189392125Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4 pid=1978 runtime=io.containerd.runc.v2 May 17 00:43:31.203562 systemd[1]: Created slice kubepods-besteffort-podb91dc9c5_4f61_4f93_8cd1_baacadbfd967.slice. May 17 00:43:31.232081 systemd[1]: Started cri-containerd-0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4.scope. May 17 00:43:31.256990 kernel: kauditd_printk_skb: 263 callbacks suppressed May 17 00:43:31.257131 kernel: audit: type=1400 audit(1747442611.249:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257161 kernel: audit: type=1400 audit(1747442611.249:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257181 kernel: audit: type=1400 audit(1747442611.249:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257812 kubelet[1930]: I0517 00:43:31.257593 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kflwx\" (UniqueName: \"kubernetes.io/projected/b91dc9c5-4f61-4f93-8cd1-baacadbfd967-kube-api-access-kflwx\") pod \"tigera-operator-844669ff44-7w2kb\" (UID: \"b91dc9c5-4f61-4f93-8cd1-baacadbfd967\") " pod="tigera-operator/tigera-operator-844669ff44-7w2kb" May 17 00:43:31.257812 kubelet[1930]: I0517 00:43:31.257634 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b91dc9c5-4f61-4f93-8cd1-baacadbfd967-var-lib-calico\") pod \"tigera-operator-844669ff44-7w2kb\" (UID: \"b91dc9c5-4f61-4f93-8cd1-baacadbfd967\") " pod="tigera-operator/tigera-operator-844669ff44-7w2kb" May 17 00:43:31.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.260399 kernel: audit: type=1400 audit(1747442611.249:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.265860 kernel: audit: type=1400 audit(1747442611.249:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.265922 kernel: audit: type=1400 audit(1747442611.249:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.265948 kernel: audit: type=1400 audit(1747442611.249:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.268175 kernel: audit: type=1400 audit(1747442611.249:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.270465 kernel: audit: type=1400 audit(1747442611.249:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.272676 kernel: audit: type=1400 audit(1747442611.254:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.254000 audit: BPF prog-id=106 op=LOAD May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1978 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333538323161636235653331623639326334323934666263633063 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1978 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333538323161636235653331623639326334323934666263633063 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.257000 audit: BPF prog-id=107 op=LOAD May 17 00:43:31.257000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000247f90 items=0 ppid=1978 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333538323161636235653331623639326334323934666263633063 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit: BPF prog-id=108 op=LOAD May 17 00:43:31.259000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000247fd8 items=0 ppid=1978 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333538323161636235653331623639326334323934666263633063 May 17 00:43:31.259000 audit: BPF prog-id=108 op=UNLOAD May 17 00:43:31.259000 audit: BPF prog-id=107 op=UNLOAD May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { perfmon } for pid=1988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit[1988]: AVC avc: denied { bpf } for pid=1988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.259000 audit: BPF prog-id=109 op=LOAD May 17 00:43:31.259000 audit[1988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003943e8 items=0 ppid=1978 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333538323161636235653331623639326334323934666263633063 May 17 00:43:31.288150 env[1190]: time="2025-05-17T00:43:31.288096325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5vtq7,Uid:63b326ce-70e5-46d4-88f5-2063e93f41f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4\"" May 17 00:43:31.288995 kubelet[1930]: E0517 00:43:31.288964 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:31.294109 env[1190]: time="2025-05-17T00:43:31.293559282Z" level=info msg="CreateContainer within sandbox \"0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:43:31.307014 env[1190]: time="2025-05-17T00:43:31.306944140Z" level=info msg="CreateContainer within sandbox \"0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b9d1cd77f2301a3db7bf4c50f45b11a2d6b2ecfac47dcbd6db2a898c1b348968\"" May 17 00:43:31.309135 env[1190]: time="2025-05-17T00:43:31.307937704Z" level=info msg="StartContainer for \"b9d1cd77f2301a3db7bf4c50f45b11a2d6b2ecfac47dcbd6db2a898c1b348968\"" May 17 00:43:31.328687 systemd[1]: Started cri-containerd-b9d1cd77f2301a3db7bf4c50f45b11a2d6b2ecfac47dcbd6db2a898c1b348968.scope. May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=7f066b39b8f8 items=0 ppid=1978 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643163643737663233303161336462376266346335306634356231 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit: BPF prog-id=110 op=LOAD May 17 00:43:31.358000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001219d8 a2=78 a3=c00017c618 items=0 ppid=1978 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643163643737663233303161336462376266346335306634356231 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.358000 audit: BPF prog-id=111 op=LOAD May 17 00:43:31.358000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000121770 a2=78 a3=c00017c668 items=0 ppid=1978 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643163643737663233303161336462376266346335306634356231 May 17 00:43:31.360000 audit: BPF prog-id=111 op=UNLOAD May 17 00:43:31.360000 audit: BPF prog-id=110 op=UNLOAD May 17 00:43:31.360000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.360000 audit: BPF prog-id=112 op=LOAD May 17 00:43:31.360000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000121c30 a2=78 a3=c00017c6f8 items=0 ppid=1978 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643163643737663233303161336462376266346335306634356231 May 17 00:43:31.389665 kubelet[1930]: E0517 00:43:31.389627 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:31.392622 env[1190]: time="2025-05-17T00:43:31.392572678Z" level=info msg="StartContainer for \"b9d1cd77f2301a3db7bf4c50f45b11a2d6b2ecfac47dcbd6db2a898c1b348968\" returns successfully" May 17 00:43:31.509174 env[1190]: time="2025-05-17T00:43:31.509045175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-7w2kb,Uid:b91dc9c5-4f61-4f93-8cd1-baacadbfd967,Namespace:tigera-operator,Attempt:0,}" May 17 00:43:31.528889 env[1190]: time="2025-05-17T00:43:31.528758399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:31.528889 env[1190]: time="2025-05-17T00:43:31.528829467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:31.529352 env[1190]: time="2025-05-17T00:43:31.528845542Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:31.530408 env[1190]: time="2025-05-17T00:43:31.529412001Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3391248c5b54d2c550a91be8e1875f34edc35839c2b547462e3b8bbce816202 pid=2059 runtime=io.containerd.runc.v2 May 17 00:43:31.536074 kubelet[1930]: E0517 00:43:31.535026 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:31.561190 systemd[1]: Started cri-containerd-b3391248c5b54d2c550a91be8e1875f34edc35839c2b547462e3b8bbce816202.scope. May 17 00:43:31.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.602000 audit: BPF prog-id=113 op=LOAD May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001fbc48 a2=10 a3=1c items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333931323438633562353464326335353061393162653865313837 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001fb6b0 a2=3c a3=c items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333931323438633562353464326335353061393162653865313837 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit: BPF prog-id=114 op=LOAD May 17 00:43:31.603000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001fb9d8 a2=78 a3=c000354a10 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333931323438633562353464326335353061393162653865313837 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit: BPF prog-id=115 op=LOAD May 17 00:43:31.603000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001fb770 a2=78 a3=c000354a58 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333931323438633562353464326335353061393162653865313837 May 17 00:43:31.603000 audit: BPF prog-id=115 op=UNLOAD May 17 00:43:31.603000 audit: BPF prog-id=114 op=UNLOAD May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:31.603000 audit: BPF prog-id=116 op=LOAD May 17 00:43:31.603000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001fbc30 a2=78 a3=c000354e68 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333931323438633562353464326335353061393162653865313837 May 17 00:43:31.654000 audit[2118]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.654000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91ef4df0 a2=0 a3=7ffc91ef4ddc items=0 ppid=2028 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:43:31.657000 audit[2120]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.658370 env[1190]: time="2025-05-17T00:43:31.658319314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-7w2kb,Uid:b91dc9c5-4f61-4f93-8cd1-baacadbfd967,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b3391248c5b54d2c550a91be8e1875f34edc35839c2b547462e3b8bbce816202\"" May 17 00:43:31.657000 audit[2119]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.657000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0631d8b0 a2=0 a3=7ffd0631d89c items=0 ppid=2028 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:43:31.660993 env[1190]: time="2025-05-17T00:43:31.660958968Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:43:31.657000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebc67be20 a2=0 a3=7ffebc67be0c items=0 ppid=2028 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:43:31.667000 audit[2121]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.667000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5a106d80 a2=0 a3=7ffe5a106d6c items=0 ppid=2028 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:43:31.669000 audit[2122]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.669000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb46754b0 a2=0 a3=7ffdb467549c items=0 ppid=2028 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:43:31.669000 audit[2123]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.669000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3ae7a340 a2=0 a3=7ffc3ae7a32c items=0 ppid=2028 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:43:31.748000 audit[2124]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.748000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2296c4d0 a2=0 a3=7ffe2296c4bc items=0 ppid=2028 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:43:31.753000 audit[2126]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.753000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe77638fe0 a2=0 a3=7ffe77638fcc items=0 ppid=2028 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:43:31.764000 audit[2129]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.764000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde74078d0 a2=0 a3=7ffde74078bc items=0 ppid=2028 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:43:31.767000 audit[2130]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.767000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee2f767f0 a2=0 a3=7ffee2f767dc items=0 ppid=2028 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:43:31.772000 audit[2132]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.772000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe32e0f220 a2=0 a3=7ffe32e0f20c items=0 ppid=2028 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:43:31.775000 audit[2133]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.775000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39e49800 a2=0 a3=7ffd39e497ec items=0 ppid=2028 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:43:31.779000 audit[2135]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.779000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff01df1340 a2=0 a3=7fff01df132c items=0 ppid=2028 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:43:31.786000 audit[2138]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.786000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd91842f60 a2=0 a3=7ffd91842f4c items=0 ppid=2028 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:43:31.789000 audit[2139]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.789000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde19efc80 a2=0 a3=7ffde19efc6c items=0 ppid=2028 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:43:31.794000 audit[2141]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.794000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcacb12070 a2=0 a3=7ffcacb1205c items=0 ppid=2028 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:43:31.796000 audit[2142]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.796000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7bd64860 a2=0 a3=7fff7bd6484c items=0 ppid=2028 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:43:31.801000 audit[2144]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.801000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff110a3850 a2=0 a3=7fff110a383c items=0 ppid=2028 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:31.808000 audit[2147]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.808000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd399e1e50 a2=0 a3=7ffd399e1e3c items=0 ppid=2028 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:31.815000 audit[2150]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.815000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0d115500 a2=0 a3=7fff0d1154ec items=0 ppid=2028 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:43:31.817000 audit[2151]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.817000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd214ab150 a2=0 a3=7ffd214ab13c items=0 ppid=2028 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:43:31.823000 audit[2153]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.823000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd0fdb0420 a2=0 a3=7ffd0fdb040c items=0 ppid=2028 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:31.829000 audit[2156]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.829000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe77bee270 a2=0 a3=7ffe77bee25c items=0 ppid=2028 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:31.831000 audit[2157]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.831000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1a30d6c0 a2=0 a3=7ffd1a30d6ac items=0 ppid=2028 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:43:31.836000 audit[2159]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:31.836000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe4664d690 a2=0 a3=7ffe4664d67c items=0 ppid=2028 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:43:31.869000 audit[2165]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:31.869000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdea09b920 a2=0 a3=7ffdea09b90c items=0 ppid=2028 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:31.878000 audit[2165]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:31.878000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdea09b920 a2=0 a3=7ffdea09b90c items=0 ppid=2028 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:31.880000 audit[2170]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.880000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0bf0dc20 a2=0 a3=7fff0bf0dc0c items=0 ppid=2028 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:43:31.884000 audit[2172]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.884000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcf37f3e50 a2=0 a3=7ffcf37f3e3c items=0 ppid=2028 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:43:31.889000 audit[2175]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.889000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5b9c2440 a2=0 a3=7ffd5b9c242c items=0 ppid=2028 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:43:31.891000 audit[2176]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.891000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe46d3dbf0 a2=0 a3=7ffe46d3dbdc items=0 ppid=2028 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:43:31.894000 audit[2178]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.894000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb8cfef60 a2=0 a3=7ffcb8cfef4c items=0 ppid=2028 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:43:31.895000 audit[2179]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.895000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefe7db370 a2=0 a3=7ffefe7db35c items=0 ppid=2028 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:43:31.898000 audit[2181]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.898000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff72b41de0 a2=0 a3=7fff72b41dcc items=0 ppid=2028 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:43:31.903000 audit[2184]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.903000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdfd21ec30 a2=0 a3=7ffdfd21ec1c items=0 ppid=2028 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:43:31.905000 audit[2185]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.905000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd80a0c1c0 a2=0 a3=7ffd80a0c1ac items=0 ppid=2028 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:43:31.907000 audit[2187]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.907000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffff9df7e0 a2=0 a3=7fffff9df7cc items=0 ppid=2028 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:43:31.909000 audit[2188]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.909000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf732e210 a2=0 a3=7ffcf732e1fc items=0 ppid=2028 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:43:31.912000 audit[2190]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.912000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc58b49410 a2=0 a3=7ffc58b493fc items=0 ppid=2028 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:31.917000 audit[2193]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.917000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeaaf4ad30 a2=0 a3=7ffeaaf4ad1c items=0 ppid=2028 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:43:31.921000 audit[2196]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.921000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd6e5c6a0 a2=0 a3=7ffdd6e5c68c items=0 ppid=2028 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:43:31.923000 audit[2197]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.923000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdeff630f0 a2=0 a3=7ffdeff630dc items=0 ppid=2028 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:43:31.925000 audit[2199]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.925000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc4445d2f0 a2=0 a3=7ffc4445d2dc items=0 ppid=2028 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:31.929000 audit[2202]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.929000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd8a00c7f0 a2=0 a3=7ffd8a00c7dc items=0 ppid=2028 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:31.931000 audit[2203]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.931000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7b873b20 a2=0 a3=7fff7b873b0c items=0 ppid=2028 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:43:31.934000 audit[2205]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.934000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd7222f650 a2=0 a3=7ffd7222f63c items=0 ppid=2028 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:43:31.936000 audit[2206]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.936000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdca2597c0 a2=0 a3=7ffdca2597ac items=0 ppid=2028 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:43:31.939000 audit[2208]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.939000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2d331400 a2=0 a3=7ffe2d3313ec items=0 ppid=2028 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:31.943000 audit[2211]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:31.943000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe00251190 a2=0 a3=7ffe0025117c items=0 ppid=2028 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:31.947000 audit[2213]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:43:31.947000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffeb8ee5e80 a2=0 a3=7ffeb8ee5e6c items=0 ppid=2028 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.947000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:31.948000 audit[2213]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:43:31.948000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb8ee5e80 a2=0 a3=7ffeb8ee5e6c items=0 ppid=2028 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.948000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:32.078709 systemd[1]: run-containerd-runc-k8s.io-0735821acb5e31b692c4294fbcc0cdb55f02c05e9033a78b416525e7e2702cb4-runc.60nG1D.mount: Deactivated successfully. May 17 00:43:32.214515 kubelet[1930]: E0517 00:43:32.214485 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:32.216590 kubelet[1930]: E0517 00:43:32.216561 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:32.217559 kubelet[1930]: E0517 00:43:32.217519 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:32.258114 kubelet[1930]: I0517 00:43:32.258046 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-5vtq7" podStartSLOduration=2.258023048 podStartE2EDuration="2.258023048s" podCreationTimestamp="2025-05-17 00:43:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:43:32.244552176 +0000 UTC m=+7.304839093" watchObservedRunningTime="2025-05-17 00:43:32.258023048 +0000 UTC m=+7.318309852" May 17 00:43:33.065244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3700930365.mount: Deactivated successfully. May 17 00:43:33.216716 kubelet[1930]: E0517 00:43:33.216684 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:33.789358 kubelet[1930]: E0517 00:43:33.789324 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:34.221751 kubelet[1930]: E0517 00:43:34.221616 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:34.396845 env[1190]: time="2025-05-17T00:43:34.396731752Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:34.399546 env[1190]: time="2025-05-17T00:43:34.399471060Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:34.402082 env[1190]: time="2025-05-17T00:43:34.402013457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:34.404522 env[1190]: time="2025-05-17T00:43:34.404464149Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:34.405186 env[1190]: time="2025-05-17T00:43:34.405131023Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:43:34.409880 env[1190]: time="2025-05-17T00:43:34.409834386Z" level=info msg="CreateContainer within sandbox \"b3391248c5b54d2c550a91be8e1875f34edc35839c2b547462e3b8bbce816202\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:43:34.422951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2090764711.mount: Deactivated successfully. May 17 00:43:34.433023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1188120183.mount: Deactivated successfully. May 17 00:43:34.435549 env[1190]: time="2025-05-17T00:43:34.435490310Z" level=info msg="CreateContainer within sandbox \"b3391248c5b54d2c550a91be8e1875f34edc35839c2b547462e3b8bbce816202\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"62190b66827bafca763e0e05ee2ea6d4a57708c5ec2eba1d1b1694a8582d9044\"" May 17 00:43:34.438029 env[1190]: time="2025-05-17T00:43:34.436690486Z" level=info msg="StartContainer for \"62190b66827bafca763e0e05ee2ea6d4a57708c5ec2eba1d1b1694a8582d9044\"" May 17 00:43:34.461990 systemd[1]: Started cri-containerd-62190b66827bafca763e0e05ee2ea6d4a57708c5ec2eba1d1b1694a8582d9044.scope. May 17 00:43:34.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.492000 audit: BPF prog-id=117 op=LOAD May 17 00:43:34.493000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.493000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2059 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313930623636383237626166636137363365306530356565326561 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2059 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313930623636383237626166636137363365306530356565326561 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit: BPF prog-id=118 op=LOAD May 17 00:43:34.494000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000970c0 items=0 ppid=2059 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313930623636383237626166636137363365306530356565326561 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit: BPF prog-id=119 op=LOAD May 17 00:43:34.494000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000097108 items=0 ppid=2059 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313930623636383237626166636137363365306530356565326561 May 17 00:43:34.494000 audit: BPF prog-id=119 op=UNLOAD May 17 00:43:34.494000 audit: BPF prog-id=118 op=UNLOAD May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.494000 audit: BPF prog-id=120 op=LOAD May 17 00:43:34.494000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000097518 items=0 ppid=2059 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313930623636383237626166636137363365306530356565326561 May 17 00:43:34.514950 env[1190]: time="2025-05-17T00:43:34.514895387Z" level=info msg="StartContainer for \"62190b66827bafca763e0e05ee2ea6d4a57708c5ec2eba1d1b1694a8582d9044\" returns successfully" May 17 00:43:39.805000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:39.807201 kernel: kauditd_printk_skb: 357 callbacks suppressed May 17 00:43:39.807268 kernel: audit: type=1106 audit(1747442619.805:936): pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:39.806135 sudo[1334]: pam_unix(sudo:session): session closed for user root May 17 00:43:39.806000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:39.813326 kernel: audit: type=1104 audit(1747442619.806:937): pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:39.818364 sshd[1330]: pam_unix(sshd:session): session closed for user core May 17 00:43:39.819000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:39.824266 systemd[1]: sshd@6-134.199.236.151:22-147.75.109.163:51338.service: Deactivated successfully. May 17 00:43:39.824689 kernel: audit: type=1106 audit(1747442619.819:938): pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:39.825134 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:43:39.825298 systemd[1]: session-7.scope: Consumed 4.567s CPU time. May 17 00:43:39.820000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:39.828316 kernel: audit: type=1104 audit(1747442619.820:939): pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:39.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-134.199.236.151:22-147.75.109.163:51338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:39.828686 systemd-logind[1179]: Session 7 logged out. Waiting for processes to exit. May 17 00:43:39.832622 kernel: audit: type=1131 audit(1747442619.824:940): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-134.199.236.151:22-147.75.109.163:51338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:39.832874 systemd-logind[1179]: Removed session 7. May 17 00:43:40.925000 audit[2301]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.927321 kernel: audit: type=1325 audit(1747442620.925:941): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.925000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd36644940 a2=0 a3=7ffd3664492c items=0 ppid=2028 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.932323 kernel: audit: type=1300 audit(1747442620.925:941): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd36644940 a2=0 a3=7ffd3664492c items=0 ppid=2028 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.932464 kernel: audit: type=1327 audit(1747442620.925:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:40.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:40.934000 audit[2301]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.937055 kernel: audit: type=1325 audit(1747442620.934:942): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.934000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd36644940 a2=0 a3=0 items=0 ppid=2028 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.941041 kernel: audit: type=1300 audit(1747442620.934:942): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd36644940 a2=0 a3=0 items=0 ppid=2028 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:40.960000 audit[2303]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.960000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffed1836ed0 a2=0 a3=7ffed1836ebc items=0 ppid=2028 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:40.964000 audit[2303]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:40.964000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffed1836ed0 a2=0 a3=0 items=0 ppid=2028 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:40.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:42.855068 update_engine[1182]: I0517 00:43:42.854355 1182 update_attempter.cc:509] Updating boot flags... May 17 00:43:43.187000 audit[2319]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:43.187000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd031493c0 a2=0 a3=7ffd031493ac items=0 ppid=2028 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:43.195000 audit[2319]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:43.195000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd031493c0 a2=0 a3=0 items=0 ppid=2028 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:43.236000 audit[2321]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:43.236000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff7bacac20 a2=0 a3=7fff7bacac0c items=0 ppid=2028 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:43.242000 audit[2321]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:43.242000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7bacac20 a2=0 a3=0 items=0 ppid=2028 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:43.838664 kubelet[1930]: I0517 00:43:43.838564 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-7w2kb" podStartSLOduration=10.091239577 podStartE2EDuration="12.837912019s" podCreationTimestamp="2025-05-17 00:43:31 +0000 UTC" firstStartedPulling="2025-05-17 00:43:31.660081484 +0000 UTC m=+6.720368272" lastFinishedPulling="2025-05-17 00:43:34.406753917 +0000 UTC m=+9.467040714" observedRunningTime="2025-05-17 00:43:35.235342248 +0000 UTC m=+10.295629097" watchObservedRunningTime="2025-05-17 00:43:43.837912019 +0000 UTC m=+18.898198824" May 17 00:43:43.851959 systemd[1]: Created slice kubepods-besteffort-podbf15969e_47b0_4462_85fc_ace92584007a.slice. May 17 00:43:44.042038 kubelet[1930]: I0517 00:43:44.041975 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bf15969e-47b0-4462-85fc-ace92584007a-tigera-ca-bundle\") pod \"calico-typha-7fc947c966-gkzpb\" (UID: \"bf15969e-47b0-4462-85fc-ace92584007a\") " pod="calico-system/calico-typha-7fc947c966-gkzpb" May 17 00:43:44.042038 kubelet[1930]: I0517 00:43:44.042026 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/bf15969e-47b0-4462-85fc-ace92584007a-typha-certs\") pod \"calico-typha-7fc947c966-gkzpb\" (UID: \"bf15969e-47b0-4462-85fc-ace92584007a\") " pod="calico-system/calico-typha-7fc947c966-gkzpb" May 17 00:43:44.042038 kubelet[1930]: I0517 00:43:44.042056 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2glc6\" (UniqueName: \"kubernetes.io/projected/bf15969e-47b0-4462-85fc-ace92584007a-kube-api-access-2glc6\") pod \"calico-typha-7fc947c966-gkzpb\" (UID: \"bf15969e-47b0-4462-85fc-ace92584007a\") " pod="calico-system/calico-typha-7fc947c966-gkzpb" May 17 00:43:44.216512 systemd[1]: Created slice kubepods-besteffort-pod95c68149_90b8_4304_89d6_339c70d65629.slice. May 17 00:43:44.256000 audit[2325]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:44.256000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff4cc31380 a2=0 a3=7fff4cc3136c items=0 ppid=2028 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:44.263000 audit[2325]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:44.263000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff4cc31380 a2=0 a3=0 items=0 ppid=2028 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:44.343855 kubelet[1930]: I0517 00:43:44.343790 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-xtables-lock\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344142 kubelet[1930]: I0517 00:43:44.344097 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-var-run-calico\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344206 kubelet[1930]: I0517 00:43:44.344152 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/95c68149-90b8-4304-89d6-339c70d65629-tigera-ca-bundle\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344206 kubelet[1930]: I0517 00:43:44.344176 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-cni-log-dir\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344319 kubelet[1930]: I0517 00:43:44.344209 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-cni-bin-dir\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344319 kubelet[1930]: I0517 00:43:44.344226 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-cni-net-dir\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344319 kubelet[1930]: I0517 00:43:44.344242 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-flexvol-driver-host\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344319 kubelet[1930]: I0517 00:43:44.344271 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/95c68149-90b8-4304-89d6-339c70d65629-node-certs\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344319 kubelet[1930]: I0517 00:43:44.344314 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g5nrq\" (UniqueName: \"kubernetes.io/projected/95c68149-90b8-4304-89d6-339c70d65629-kube-api-access-g5nrq\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344473 kubelet[1930]: I0517 00:43:44.344335 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-lib-modules\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344473 kubelet[1930]: I0517 00:43:44.344349 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-policysync\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.344473 kubelet[1930]: I0517 00:43:44.344366 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/95c68149-90b8-4304-89d6-339c70d65629-var-lib-calico\") pod \"calico-node-d9hk9\" (UID: \"95c68149-90b8-4304-89d6-339c70d65629\") " pod="calico-system/calico-node-d9hk9" May 17 00:43:44.447636 kubelet[1930]: E0517 00:43:44.447585 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.447636 kubelet[1930]: W0517 00:43:44.447622 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.448471 kubelet[1930]: E0517 00:43:44.448434 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.449813 kubelet[1930]: E0517 00:43:44.449777 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.449998 kubelet[1930]: W0517 00:43:44.449967 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.450123 kubelet[1930]: E0517 00:43:44.450102 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.450510 kubelet[1930]: E0517 00:43:44.450493 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.450674 kubelet[1930]: W0517 00:43:44.450656 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.450763 kubelet[1930]: E0517 00:43:44.450749 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.451040 kubelet[1930]: E0517 00:43:44.451027 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.451141 kubelet[1930]: W0517 00:43:44.451119 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.451243 kubelet[1930]: E0517 00:43:44.451221 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.451567 kubelet[1930]: E0517 00:43:44.451549 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.451725 kubelet[1930]: W0517 00:43:44.451650 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.451809 kubelet[1930]: E0517 00:43:44.451797 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.452055 kubelet[1930]: E0517 00:43:44.452042 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.452135 kubelet[1930]: W0517 00:43:44.452120 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.452276 kubelet[1930]: E0517 00:43:44.452260 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.453845 kubelet[1930]: E0517 00:43:44.453827 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.453952 kubelet[1930]: W0517 00:43:44.453937 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.454163 kubelet[1930]: E0517 00:43:44.454148 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.457978 kubelet[1930]: E0517 00:43:44.457914 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.457978 kubelet[1930]: W0517 00:43:44.457952 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.458192 kubelet[1930]: E0517 00:43:44.457989 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.459794 kubelet[1930]: E0517 00:43:44.459762 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:44.460383 kubelet[1930]: E0517 00:43:44.460358 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.460778 kubelet[1930]: W0517 00:43:44.460753 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.460974 kubelet[1930]: E0517 00:43:44.460952 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.464265 env[1190]: time="2025-05-17T00:43:44.463809433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7fc947c966-gkzpb,Uid:bf15969e-47b0-4462-85fc-ace92584007a,Namespace:calico-system,Attempt:0,}" May 17 00:43:44.465020 kubelet[1930]: E0517 00:43:44.464989 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.465302 kubelet[1930]: W0517 00:43:44.465257 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.465561 kubelet[1930]: E0517 00:43:44.465535 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.488036 env[1190]: time="2025-05-17T00:43:44.485549073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:44.488036 env[1190]: time="2025-05-17T00:43:44.485606394Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:44.488036 env[1190]: time="2025-05-17T00:43:44.486567981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:44.488036 env[1190]: time="2025-05-17T00:43:44.486830705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e634b1215599ee643171ad302835b2daec31aa4472fc0b6183194f2cd5a42d8 pid=2345 runtime=io.containerd.runc.v2 May 17 00:43:44.497385 kubelet[1930]: E0517 00:43:44.497280 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.497385 kubelet[1930]: W0517 00:43:44.497314 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.497385 kubelet[1930]: E0517 00:43:44.497336 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.514244 systemd[1]: Started cri-containerd-3e634b1215599ee643171ad302835b2daec31aa4472fc0b6183194f2cd5a42d8.scope. May 17 00:43:44.528983 env[1190]: time="2025-05-17T00:43:44.528934983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d9hk9,Uid:95c68149-90b8-4304-89d6-339c70d65629,Namespace:calico-system,Attempt:0,}" May 17 00:43:44.548631 env[1190]: time="2025-05-17T00:43:44.548507982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:44.548920 env[1190]: time="2025-05-17T00:43:44.548877968Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:44.549070 env[1190]: time="2025-05-17T00:43:44.549033899Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:44.549547 env[1190]: time="2025-05-17T00:43:44.549496782Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8 pid=2374 runtime=io.containerd.runc.v2 May 17 00:43:44.558473 kubelet[1930]: E0517 00:43:44.558113 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:44.589401 systemd[1]: Started cri-containerd-b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8.scope. May 17 00:43:44.645355 kubelet[1930]: E0517 00:43:44.645313 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.645355 kubelet[1930]: W0517 00:43:44.645339 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.645679 kubelet[1930]: E0517 00:43:44.645372 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.645679 kubelet[1930]: E0517 00:43:44.645566 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.645679 kubelet[1930]: W0517 00:43:44.645575 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.645679 kubelet[1930]: E0517 00:43:44.645586 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.646162 kubelet[1930]: E0517 00:43:44.646135 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.646162 kubelet[1930]: W0517 00:43:44.646152 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.646354 kubelet[1930]: E0517 00:43:44.646170 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.646436 kubelet[1930]: E0517 00:43:44.646421 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.646436 kubelet[1930]: W0517 00:43:44.646431 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.646561 kubelet[1930]: E0517 00:43:44.646441 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.646696 kubelet[1930]: E0517 00:43:44.646673 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.646696 kubelet[1930]: W0517 00:43:44.646686 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.646696 kubelet[1930]: E0517 00:43:44.646697 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.647174 kubelet[1930]: E0517 00:43:44.647151 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.647174 kubelet[1930]: W0517 00:43:44.647169 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.647359 kubelet[1930]: E0517 00:43:44.647181 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.647426 kubelet[1930]: E0517 00:43:44.647365 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.647426 kubelet[1930]: W0517 00:43:44.647374 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.647426 kubelet[1930]: E0517 00:43:44.647383 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.647836 kubelet[1930]: E0517 00:43:44.647814 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.647836 kubelet[1930]: W0517 00:43:44.647829 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.647836 kubelet[1930]: E0517 00:43:44.647842 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.648068 kubelet[1930]: E0517 00:43:44.648051 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.648068 kubelet[1930]: W0517 00:43:44.648062 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.648191 kubelet[1930]: E0517 00:43:44.648072 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.648537 kubelet[1930]: E0517 00:43:44.648510 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.648537 kubelet[1930]: W0517 00:43:44.648525 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.648537 kubelet[1930]: E0517 00:43:44.648538 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.648723 kubelet[1930]: E0517 00:43:44.648706 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.648723 kubelet[1930]: W0517 00:43:44.648714 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.648723 kubelet[1930]: E0517 00:43:44.648723 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.649405 kubelet[1930]: E0517 00:43:44.649367 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.649405 kubelet[1930]: W0517 00:43:44.649381 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.649405 kubelet[1930]: E0517 00:43:44.649393 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.649677 kubelet[1930]: E0517 00:43:44.649603 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.649677 kubelet[1930]: W0517 00:43:44.649610 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.649677 kubelet[1930]: E0517 00:43:44.649618 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.649819 kubelet[1930]: E0517 00:43:44.649801 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.649819 kubelet[1930]: W0517 00:43:44.649810 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.649819 kubelet[1930]: E0517 00:43:44.649818 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.652570 kubelet[1930]: E0517 00:43:44.649988 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.652570 kubelet[1930]: W0517 00:43:44.650005 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.652570 kubelet[1930]: E0517 00:43:44.650018 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.653478 kubelet[1930]: E0517 00:43:44.653434 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.653478 kubelet[1930]: W0517 00:43:44.653470 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.653723 kubelet[1930]: E0517 00:43:44.653500 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.653834 kubelet[1930]: E0517 00:43:44.653815 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.653834 kubelet[1930]: W0517 00:43:44.653830 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.653968 kubelet[1930]: E0517 00:43:44.653844 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.654633 kubelet[1930]: E0517 00:43:44.654602 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.654633 kubelet[1930]: W0517 00:43:44.654627 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.654842 kubelet[1930]: E0517 00:43:44.654654 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.654946 kubelet[1930]: E0517 00:43:44.654927 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.654946 kubelet[1930]: W0517 00:43:44.654943 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.655047 kubelet[1930]: E0517 00:43:44.654954 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.655407 kubelet[1930]: E0517 00:43:44.655387 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.655407 kubelet[1930]: W0517 00:43:44.655401 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.655507 kubelet[1930]: E0517 00:43:44.655413 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.656434 kubelet[1930]: E0517 00:43:44.656412 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.656434 kubelet[1930]: W0517 00:43:44.656427 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.656585 kubelet[1930]: E0517 00:43:44.656470 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.656585 kubelet[1930]: I0517 00:43:44.656515 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7hnr\" (UniqueName: \"kubernetes.io/projected/4012fc42-c091-49aa-9549-82c50f8e5fa6-kube-api-access-f7hnr\") pod \"csi-node-driver-f5dcv\" (UID: \"4012fc42-c091-49aa-9549-82c50f8e5fa6\") " pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:44.656783 kubelet[1930]: E0517 00:43:44.656763 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.656783 kubelet[1930]: W0517 00:43:44.656780 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.656909 kubelet[1930]: E0517 00:43:44.656802 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.656909 kubelet[1930]: I0517 00:43:44.656829 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4012fc42-c091-49aa-9549-82c50f8e5fa6-socket-dir\") pod \"csi-node-driver-f5dcv\" (UID: \"4012fc42-c091-49aa-9549-82c50f8e5fa6\") " pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:44.657140 kubelet[1930]: E0517 00:43:44.657114 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.657140 kubelet[1930]: W0517 00:43:44.657133 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.657265 kubelet[1930]: E0517 00:43:44.657154 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.657265 kubelet[1930]: I0517 00:43:44.657179 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4012fc42-c091-49aa-9549-82c50f8e5fa6-registration-dir\") pod \"csi-node-driver-f5dcv\" (UID: \"4012fc42-c091-49aa-9549-82c50f8e5fa6\") " pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:44.657561 kubelet[1930]: E0517 00:43:44.657408 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.657561 kubelet[1930]: W0517 00:43:44.657423 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.657561 kubelet[1930]: E0517 00:43:44.657435 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.657561 kubelet[1930]: I0517 00:43:44.657453 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4012fc42-c091-49aa-9549-82c50f8e5fa6-varrun\") pod \"csi-node-driver-f5dcv\" (UID: \"4012fc42-c091-49aa-9549-82c50f8e5fa6\") " pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:44.657928 kubelet[1930]: E0517 00:43:44.657791 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.657928 kubelet[1930]: W0517 00:43:44.657807 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.657928 kubelet[1930]: E0517 00:43:44.657826 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.658355 kubelet[1930]: E0517 00:43:44.658162 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.658355 kubelet[1930]: W0517 00:43:44.658183 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.658355 kubelet[1930]: E0517 00:43:44.658207 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.658587 kubelet[1930]: E0517 00:43:44.658528 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.658587 kubelet[1930]: W0517 00:43:44.658540 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.658587 kubelet[1930]: E0517 00:43:44.658556 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.658870 kubelet[1930]: E0517 00:43:44.658816 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.658870 kubelet[1930]: W0517 00:43:44.658832 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.658870 kubelet[1930]: E0517 00:43:44.658858 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.659011 kubelet[1930]: I0517 00:43:44.658884 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4012fc42-c091-49aa-9549-82c50f8e5fa6-kubelet-dir\") pod \"csi-node-driver-f5dcv\" (UID: \"4012fc42-c091-49aa-9549-82c50f8e5fa6\") " pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:44.659144 kubelet[1930]: E0517 00:43:44.659115 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.659144 kubelet[1930]: W0517 00:43:44.659134 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.659279 kubelet[1930]: E0517 00:43:44.659155 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659391 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.660609 kubelet[1930]: W0517 00:43:44.659407 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659426 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659653 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.660609 kubelet[1930]: W0517 00:43:44.659668 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659681 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659930 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.660609 kubelet[1930]: W0517 00:43:44.659945 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.659963 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.660609 kubelet[1930]: E0517 00:43:44.660173 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.661140 kubelet[1930]: W0517 00:43:44.660185 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.661140 kubelet[1930]: E0517 00:43:44.660198 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.661140 kubelet[1930]: E0517 00:43:44.660507 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.661140 kubelet[1930]: W0517 00:43:44.660520 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.661140 kubelet[1930]: E0517 00:43:44.660537 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.661140 kubelet[1930]: E0517 00:43:44.660804 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.661140 kubelet[1930]: W0517 00:43:44.660817 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.661140 kubelet[1930]: E0517 00:43:44.660831 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.690000 audit: BPF prog-id=121 op=LOAD May 17 00:43:44.690000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.690000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363334623132313535393965653634333137316164333032383335 May 17 00:43:44.690000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.690000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363334623132313535393965653634333137316164333032383335 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit: BPF prog-id=122 op=LOAD May 17 00:43:44.691000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e2510 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363334623132313535393965653634333137316164333032383335 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit: BPF prog-id=123 op=LOAD May 17 00:43:44.691000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e2558 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363334623132313535393965653634333137316164333032383335 May 17 00:43:44.691000 audit: BPF prog-id=123 op=UNLOAD May 17 00:43:44.691000 audit: BPF prog-id=122 op=UNLOAD May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.691000 audit: BPF prog-id=124 op=LOAD May 17 00:43:44.691000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e2968 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363334623132313535393965653634333137316164333032383335 May 17 00:43:44.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.724000 audit: BPF prog-id=125 op=LOAD May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623238633330383238366131336138643064336561663464306531 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623238633330383238366131336138643064336561663464306531 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit: BPF prog-id=126 op=LOAD May 17 00:43:44.726000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bf020 items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623238633330383238366131336138643064336561663464306531 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit: BPF prog-id=127 op=LOAD May 17 00:43:44.726000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bf068 items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623238633330383238366131336138643064336561663464306531 May 17 00:43:44.726000 audit: BPF prog-id=127 op=UNLOAD May 17 00:43:44.726000 audit: BPF prog-id=126 op=UNLOAD May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:44.726000 audit: BPF prog-id=128 op=LOAD May 17 00:43:44.726000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bf478 items=0 ppid=2374 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:44.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623238633330383238366131336138643064336561663464306531 May 17 00:43:44.759976 env[1190]: time="2025-05-17T00:43:44.759882072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d9hk9,Uid:95c68149-90b8-4304-89d6-339c70d65629,Namespace:calico-system,Attempt:0,} returns sandbox id \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\"" May 17 00:43:44.761402 kubelet[1930]: E0517 00:43:44.761067 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.761402 kubelet[1930]: W0517 00:43:44.761095 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.761402 kubelet[1930]: E0517 00:43:44.761123 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.762553 kubelet[1930]: E0517 00:43:44.762475 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.762553 kubelet[1930]: W0517 00:43:44.762503 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.762553 kubelet[1930]: E0517 00:43:44.762540 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.762932 kubelet[1930]: E0517 00:43:44.762913 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.763000 kubelet[1930]: W0517 00:43:44.762933 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.763000 kubelet[1930]: E0517 00:43:44.762958 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.763318 kubelet[1930]: E0517 00:43:44.763275 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.763384 kubelet[1930]: W0517 00:43:44.763306 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.763494 kubelet[1930]: E0517 00:43:44.763435 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.763585 kubelet[1930]: E0517 00:43:44.763565 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.763585 kubelet[1930]: W0517 00:43:44.763582 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.763704 kubelet[1930]: E0517 00:43:44.763686 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.764336 env[1190]: time="2025-05-17T00:43:44.764269927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:43:44.764445 kubelet[1930]: E0517 00:43:44.764425 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.764509 kubelet[1930]: W0517 00:43:44.764444 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.764509 kubelet[1930]: E0517 00:43:44.764466 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.764699 kubelet[1930]: E0517 00:43:44.764680 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.764699 kubelet[1930]: W0517 00:43:44.764696 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.764800 kubelet[1930]: E0517 00:43:44.764786 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.765107 kubelet[1930]: E0517 00:43:44.764928 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.765107 kubelet[1930]: W0517 00:43:44.764946 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.765107 kubelet[1930]: E0517 00:43:44.765029 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769093 kubelet[1930]: E0517 00:43:44.767459 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769093 kubelet[1930]: W0517 00:43:44.767510 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769093 kubelet[1930]: E0517 00:43:44.767809 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769093 kubelet[1930]: W0517 00:43:44.767825 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769093 kubelet[1930]: E0517 00:43:44.768024 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769093 kubelet[1930]: W0517 00:43:44.768033 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769093 kubelet[1930]: E0517 00:43:44.768231 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769093 kubelet[1930]: W0517 00:43:44.768241 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769093 kubelet[1930]: E0517 00:43:44.768443 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769093 kubelet[1930]: W0517 00:43:44.768450 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768464 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768610 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769526 kubelet[1930]: W0517 00:43:44.768617 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768625 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768694 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768756 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768833 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768836 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.769526 kubelet[1930]: E0517 00:43:44.768844 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.769526 kubelet[1930]: W0517 00:43:44.768845 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.770361 kubelet[1930]: E0517 00:43:44.768868 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.770743 kubelet[1930]: E0517 00:43:44.770606 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.771038 kubelet[1930]: W0517 00:43:44.770635 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.771439 kubelet[1930]: E0517 00:43:44.771229 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.774127 kubelet[1930]: E0517 00:43:44.774096 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.774276 kubelet[1930]: W0517 00:43:44.774258 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.777062 kubelet[1930]: E0517 00:43:44.776689 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.777498 kubelet[1930]: E0517 00:43:44.777359 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.777498 kubelet[1930]: W0517 00:43:44.777382 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.777498 kubelet[1930]: E0517 00:43:44.777467 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.777853 kubelet[1930]: E0517 00:43:44.777700 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.777853 kubelet[1930]: W0517 00:43:44.777715 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.777964 kubelet[1930]: E0517 00:43:44.777941 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.778658 kubelet[1930]: E0517 00:43:44.778637 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.778771 kubelet[1930]: W0517 00:43:44.778754 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.783759 kubelet[1930]: E0517 00:43:44.783720 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.784178 kubelet[1930]: E0517 00:43:44.784110 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.784178 kubelet[1930]: W0517 00:43:44.784133 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.785240 kubelet[1930]: E0517 00:43:44.784736 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.788134 kubelet[1930]: E0517 00:43:44.788016 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.788134 kubelet[1930]: W0517 00:43:44.788062 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.788411 kubelet[1930]: E0517 00:43:44.788340 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.790840 kubelet[1930]: E0517 00:43:44.790616 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.790840 kubelet[1930]: W0517 00:43:44.790644 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.790840 kubelet[1930]: E0517 00:43:44.790678 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.791247 kubelet[1930]: E0517 00:43:44.791132 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.791247 kubelet[1930]: W0517 00:43:44.791149 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.791247 kubelet[1930]: E0517 00:43:44.791168 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.792342 kubelet[1930]: E0517 00:43:44.792205 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.792342 kubelet[1930]: W0517 00:43:44.792227 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.792342 kubelet[1930]: E0517 00:43:44.792243 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.805744 kubelet[1930]: E0517 00:43:44.805648 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:44.805744 kubelet[1930]: W0517 00:43:44.805671 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:44.805744 kubelet[1930]: E0517 00:43:44.805695 1930 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:44.807142 env[1190]: time="2025-05-17T00:43:44.807079404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7fc947c966-gkzpb,Uid:bf15969e-47b0-4462-85fc-ace92584007a,Namespace:calico-system,Attempt:0,} returns sandbox id \"3e634b1215599ee643171ad302835b2daec31aa4472fc0b6183194f2cd5a42d8\"" May 17 00:43:44.808491 kubelet[1930]: E0517 00:43:44.807968 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:45.951237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3355197711.mount: Deactivated successfully. May 17 00:43:46.079721 env[1190]: time="2025-05-17T00:43:46.079661075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:46.081060 env[1190]: time="2025-05-17T00:43:46.081017183Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:46.083414 env[1190]: time="2025-05-17T00:43:46.083368326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:46.084437 env[1190]: time="2025-05-17T00:43:46.084402784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:46.085600 env[1190]: time="2025-05-17T00:43:46.085552907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:43:46.086896 env[1190]: time="2025-05-17T00:43:46.086858821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:43:46.088745 env[1190]: time="2025-05-17T00:43:46.088707557Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:43:46.109889 env[1190]: time="2025-05-17T00:43:46.109805217Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461\"" May 17 00:43:46.111035 env[1190]: time="2025-05-17T00:43:46.110984426Z" level=info msg="StartContainer for \"304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461\"" May 17 00:43:46.138783 kubelet[1930]: E0517 00:43:46.138734 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:46.142562 systemd[1]: Started cri-containerd-304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461.scope. May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.173298 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:43:46.173466 kernel: audit: type=1400 audit(1747442626.168:987): avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.173503 kernel: audit: type=1300 audit(1747442626.168:987): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8f5c979ac8 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:46.168000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8f5c979ac8 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:46.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346437326163323864646165623633393635646337366431323038 May 17 00:43:46.180688 kernel: audit: type=1327 audit(1747442626.168:987): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346437326163323864646165623633393635646337366431323038 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.184390 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.188383 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.188506 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.192872 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.206321 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.211438 env[1190]: time="2025-05-17T00:43:46.211390840Z" level=info msg="StartContainer for \"304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461\" returns successfully" May 17 00:43:46.213312 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.223324 kernel: audit: type=1400 audit(1747442626.168:988): avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit: BPF prog-id=129 op=LOAD May 17 00:43:46.168000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034db98 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:46.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346437326163323864646165623633393635646337366431323038 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit: BPF prog-id=130 op=LOAD May 17 00:43:46.168000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034dbe8 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:46.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346437326163323864646165623633393635646337366431323038 May 17 00:43:46.168000 audit: BPF prog-id=130 op=UNLOAD May 17 00:43:46.168000 audit: BPF prog-id=129 op=UNLOAD May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:46.168000 audit: BPF prog-id=131 op=LOAD May 17 00:43:46.168000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034dc78 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:46.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346437326163323864646165623633393635646337366431323038 May 17 00:43:46.238982 systemd[1]: cri-containerd-304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461.scope: Deactivated successfully. May 17 00:43:46.240000 audit: BPF prog-id=131 op=UNLOAD May 17 00:43:46.287969 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461-rootfs.mount: Deactivated successfully. May 17 00:43:46.291616 env[1190]: time="2025-05-17T00:43:46.291567326Z" level=info msg="shim disconnected" id=304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461 May 17 00:43:46.291904 env[1190]: time="2025-05-17T00:43:46.291871082Z" level=warning msg="cleaning up after shim disconnected" id=304d72ac28ddaeb63965dc76d1208784d41514fc55198f9a6f01a4ab8b973461 namespace=k8s.io May 17 00:43:46.292025 env[1190]: time="2025-05-17T00:43:46.292007633Z" level=info msg="cleaning up dead shim" May 17 00:43:46.302996 env[1190]: time="2025-05-17T00:43:46.302949666Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:43:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2535 runtime=io.containerd.runc.v2\n" May 17 00:43:48.138310 kubelet[1930]: E0517 00:43:48.138186 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:48.204180 env[1190]: time="2025-05-17T00:43:48.204121348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:48.205418 env[1190]: time="2025-05-17T00:43:48.205375051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:48.207004 env[1190]: time="2025-05-17T00:43:48.206962112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:48.208632 env[1190]: time="2025-05-17T00:43:48.208593636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:48.208858 env[1190]: time="2025-05-17T00:43:48.208833531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:43:48.212523 env[1190]: time="2025-05-17T00:43:48.211648230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:43:48.236992 env[1190]: time="2025-05-17T00:43:48.236932558Z" level=info msg="CreateContainer within sandbox \"3e634b1215599ee643171ad302835b2daec31aa4472fc0b6183194f2cd5a42d8\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:43:48.249167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2088800806.mount: Deactivated successfully. May 17 00:43:48.256261 env[1190]: time="2025-05-17T00:43:48.256202369Z" level=info msg="CreateContainer within sandbox \"3e634b1215599ee643171ad302835b2daec31aa4472fc0b6183194f2cd5a42d8\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"efef163d77c5c2ac3617b3f4694e4f05c2da8d84066448f4383c05e9bb6e7208\"" May 17 00:43:48.259685 env[1190]: time="2025-05-17T00:43:48.259605700Z" level=info msg="StartContainer for \"efef163d77c5c2ac3617b3f4694e4f05c2da8d84066448f4383c05e9bb6e7208\"" May 17 00:43:48.299498 systemd[1]: Started cri-containerd-efef163d77c5c2ac3617b3f4694e4f05c2da8d84066448f4383c05e9bb6e7208.scope. May 17 00:43:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.317000 audit: BPF prog-id=132 op=LOAD May 17 00:43:48.318000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.318000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2345 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566656631363364373763356332616333363137623366343639346534 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2345 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566656631363364373763356332616333363137623366343639346534 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.319000 audit: BPF prog-id=133 op=LOAD May 17 00:43:48.319000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d8b70 items=0 ppid=2345 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566656631363364373763356332616333363137623366343639346534 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.320000 audit: BPF prog-id=134 op=LOAD May 17 00:43:48.320000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d8bb8 items=0 ppid=2345 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566656631363364373763356332616333363137623366343639346534 May 17 00:43:48.321000 audit: BPF prog-id=134 op=UNLOAD May 17 00:43:48.321000 audit: BPF prog-id=133 op=UNLOAD May 17 00:43:48.321000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:48.321000 audit: BPF prog-id=135 op=LOAD May 17 00:43:48.321000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8fc8 items=0 ppid=2345 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566656631363364373763356332616333363137623366343639346534 May 17 00:43:48.363123 env[1190]: time="2025-05-17T00:43:48.363004429Z" level=info msg="StartContainer for \"efef163d77c5c2ac3617b3f4694e4f05c2da8d84066448f4383c05e9bb6e7208\" returns successfully" May 17 00:43:49.266761 kubelet[1930]: E0517 00:43:49.266541 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:50.138692 kubelet[1930]: E0517 00:43:50.138600 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:50.267920 kubelet[1930]: I0517 00:43:50.267878 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:50.268506 kubelet[1930]: E0517 00:43:50.268209 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:51.616092 env[1190]: time="2025-05-17T00:43:51.615983293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:51.617640 env[1190]: time="2025-05-17T00:43:51.617598377Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:51.620690 env[1190]: time="2025-05-17T00:43:51.619840867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:51.621474 env[1190]: time="2025-05-17T00:43:51.621442459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:51.622298 env[1190]: time="2025-05-17T00:43:51.622114194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:43:51.625332 env[1190]: time="2025-05-17T00:43:51.625259343Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:43:51.637998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3144227746.mount: Deactivated successfully. May 17 00:43:51.651784 env[1190]: time="2025-05-17T00:43:51.651716579Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1\"" May 17 00:43:51.655167 env[1190]: time="2025-05-17T00:43:51.655123266Z" level=info msg="StartContainer for \"e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1\"" May 17 00:43:51.679892 systemd[1]: Started cri-containerd-e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1.scope. May 17 00:43:51.713707 kernel: kauditd_printk_skb: 91 callbacks suppressed May 17 00:43:51.713875 kernel: audit: type=1400 audit(1747442631.709:1012): avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.709000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.720769 kernel: audit: type=1300 audit(1747442631.709:1012): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efdb46b6518 items=0 ppid=2374 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.720937 kernel: audit: type=1327 audit(1747442631.709:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633465633636353434666230323735313766663365616663643839 May 17 00:43:51.709000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efdb46b6518 items=0 ppid=2374 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633465633636353434666230323735313766663365616663643839 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.724308 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.727320 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.732307 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.737357 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.737444 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.740063 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.742380 kernel: audit: type=1400 audit(1747442631.715:1013): avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.715000 audit: BPF prog-id=136 op=LOAD May 17 00:43:51.715000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfb98 items=0 ppid=2374 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633465633636353434666230323735313766663365616663643839 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit: BPF prog-id=137 op=LOAD May 17 00:43:51.719000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfbe8 items=0 ppid=2374 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633465633636353434666230323735313766663365616663643839 May 17 00:43:51.719000 audit: BPF prog-id=137 op=UNLOAD May 17 00:43:51.719000 audit: BPF prog-id=136 op=UNLOAD May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:51.719000 audit: BPF prog-id=138 op=LOAD May 17 00:43:51.719000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfc78 items=0 ppid=2374 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633465633636353434666230323735313766663365616663643839 May 17 00:43:51.748668 env[1190]: time="2025-05-17T00:43:51.748607836Z" level=info msg="StartContainer for \"e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1\" returns successfully" May 17 00:43:52.139277 kubelet[1930]: E0517 00:43:52.138644 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:52.304089 kubelet[1930]: I0517 00:43:52.304012 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7fc947c966-gkzpb" podStartSLOduration=5.902505629 podStartE2EDuration="9.30398786s" podCreationTimestamp="2025-05-17 00:43:43 +0000 UTC" firstStartedPulling="2025-05-17 00:43:44.80953473 +0000 UTC m=+19.869821514" lastFinishedPulling="2025-05-17 00:43:48.211016859 +0000 UTC m=+23.271303745" observedRunningTime="2025-05-17 00:43:49.281946004 +0000 UTC m=+24.342232809" watchObservedRunningTime="2025-05-17 00:43:52.30398786 +0000 UTC m=+27.364274662" May 17 00:43:52.444793 env[1190]: time="2025-05-17T00:43:52.444576876Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:43:52.448676 systemd[1]: cri-containerd-e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1.scope: Deactivated successfully. May 17 00:43:52.451000 audit: BPF prog-id=138 op=UNLOAD May 17 00:43:52.474067 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1-rootfs.mount: Deactivated successfully. May 17 00:43:52.479107 env[1190]: time="2025-05-17T00:43:52.479040868Z" level=info msg="shim disconnected" id=e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1 May 17 00:43:52.479107 env[1190]: time="2025-05-17T00:43:52.479106187Z" level=warning msg="cleaning up after shim disconnected" id=e6c4ec66544fb027517ff3eafcd8989e18a427aa3e114b85eefdd8d6b05a70f1 namespace=k8s.io May 17 00:43:52.479363 env[1190]: time="2025-05-17T00:43:52.479121486Z" level=info msg="cleaning up dead shim" May 17 00:43:52.488877 env[1190]: time="2025-05-17T00:43:52.488817798Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:43:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2642 runtime=io.containerd.runc.v2\n" May 17 00:43:52.543719 kubelet[1930]: I0517 00:43:52.543688 1930 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:43:52.586058 systemd[1]: Created slice kubepods-besteffort-podc4bb3358_e28d_4ca6_85a3_44bffbfd8fb1.slice. May 17 00:43:52.595213 systemd[1]: Created slice kubepods-burstable-pod73b60263_1259_4e7b_9da7_c18fb7cb6fd2.slice. May 17 00:43:52.601154 systemd[1]: Created slice kubepods-burstable-podd0ccdba1_af4b_4719_bc28_bd16d9c3505b.slice. May 17 00:43:52.624380 systemd[1]: Created slice kubepods-besteffort-pod8afe8629_8ece_4e93_aff0_9b5c027ae04a.slice. May 17 00:43:52.632070 systemd[1]: Created slice kubepods-besteffort-pode451f6f0_3693_459e_a9c7_dc41b8be0c59.slice. May 17 00:43:52.641705 systemd[1]: Created slice kubepods-besteffort-pod22e3aaa2_8915_424c_bdd8_d3b8cb1b394d.slice. May 17 00:43:52.642993 kubelet[1930]: I0517 00:43:52.642963 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s25k4\" (UniqueName: \"kubernetes.io/projected/d0ccdba1-af4b-4719-bc28-bd16d9c3505b-kube-api-access-s25k4\") pod \"coredns-668d6bf9bc-hhhm4\" (UID: \"d0ccdba1-af4b-4719-bc28-bd16d9c3505b\") " pod="kube-system/coredns-668d6bf9bc-hhhm4" May 17 00:43:52.643163 kubelet[1930]: I0517 00:43:52.643146 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/73b60263-1259-4e7b-9da7-c18fb7cb6fd2-config-volume\") pod \"coredns-668d6bf9bc-mg4ql\" (UID: \"73b60263-1259-4e7b-9da7-c18fb7cb6fd2\") " pod="kube-system/coredns-668d6bf9bc-mg4ql" May 17 00:43:52.643245 kubelet[1930]: I0517 00:43:52.643231 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t2cgc\" (UniqueName: \"kubernetes.io/projected/73b60263-1259-4e7b-9da7-c18fb7cb6fd2-kube-api-access-t2cgc\") pod \"coredns-668d6bf9bc-mg4ql\" (UID: \"73b60263-1259-4e7b-9da7-c18fb7cb6fd2\") " pod="kube-system/coredns-668d6bf9bc-mg4ql" May 17 00:43:52.643404 kubelet[1930]: I0517 00:43:52.643388 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7k69n\" (UniqueName: \"kubernetes.io/projected/c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1-kube-api-access-7k69n\") pod \"calico-kube-controllers-6984db5bf8-ssqjf\" (UID: \"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1\") " pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" May 17 00:43:52.643500 kubelet[1930]: I0517 00:43:52.643486 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nct5n\" (UniqueName: \"kubernetes.io/projected/8afe8629-8ece-4e93-aff0-9b5c027ae04a-kube-api-access-nct5n\") pod \"calico-apiserver-65f5b4d999-h99gw\" (UID: \"8afe8629-8ece-4e93-aff0-9b5c027ae04a\") " pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" May 17 00:43:52.643578 kubelet[1930]: I0517 00:43:52.643565 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/e451f6f0-3693-459e-a9c7-dc41b8be0c59-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-f6rvs\" (UID: \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\") " pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:52.643661 kubelet[1930]: I0517 00:43:52.643647 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8afe8629-8ece-4e93-aff0-9b5c027ae04a-calico-apiserver-certs\") pod \"calico-apiserver-65f5b4d999-h99gw\" (UID: \"8afe8629-8ece-4e93-aff0-9b5c027ae04a\") " pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" May 17 00:43:52.643733 kubelet[1930]: I0517 00:43:52.643721 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1-tigera-ca-bundle\") pod \"calico-kube-controllers-6984db5bf8-ssqjf\" (UID: \"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1\") " pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" May 17 00:43:52.643818 kubelet[1930]: I0517 00:43:52.643805 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d0ccdba1-af4b-4719-bc28-bd16d9c3505b-config-volume\") pod \"coredns-668d6bf9bc-hhhm4\" (UID: \"d0ccdba1-af4b-4719-bc28-bd16d9c3505b\") " pod="kube-system/coredns-668d6bf9bc-hhhm4" May 17 00:43:52.643898 kubelet[1930]: I0517 00:43:52.643884 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/e451f6f0-3693-459e-a9c7-dc41b8be0c59-config\") pod \"goldmane-78d55f7ddc-f6rvs\" (UID: \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\") " pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:52.643990 kubelet[1930]: I0517 00:43:52.643968 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e451f6f0-3693-459e-a9c7-dc41b8be0c59-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-f6rvs\" (UID: \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\") " pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:52.644101 kubelet[1930]: I0517 00:43:52.644088 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4g27k\" (UniqueName: \"kubernetes.io/projected/e451f6f0-3693-459e-a9c7-dc41b8be0c59-kube-api-access-4g27k\") pod \"goldmane-78d55f7ddc-f6rvs\" (UID: \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\") " pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:52.649914 systemd[1]: Created slice kubepods-besteffort-podedfc8f67_761b_4428_b703_bd8f02b95a90.slice. May 17 00:43:52.745752 kubelet[1930]: I0517 00:43:52.744742 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xccb7\" (UniqueName: \"kubernetes.io/projected/edfc8f67-761b-4428-b703-bd8f02b95a90-kube-api-access-xccb7\") pod \"calico-apiserver-65f5b4d999-8lqmt\" (UID: \"edfc8f67-761b-4428-b703-bd8f02b95a90\") " pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" May 17 00:43:52.745752 kubelet[1930]: I0517 00:43:52.744816 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-ca-bundle\") pod \"whisker-6566dbf9b5-l8nkk\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " pod="calico-system/whisker-6566dbf9b5-l8nkk" May 17 00:43:52.745752 kubelet[1930]: I0517 00:43:52.744849 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-backend-key-pair\") pod \"whisker-6566dbf9b5-l8nkk\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " pod="calico-system/whisker-6566dbf9b5-l8nkk" May 17 00:43:52.745752 kubelet[1930]: I0517 00:43:52.744888 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kcc4w\" (UniqueName: \"kubernetes.io/projected/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-kube-api-access-kcc4w\") pod \"whisker-6566dbf9b5-l8nkk\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " pod="calico-system/whisker-6566dbf9b5-l8nkk" May 17 00:43:52.745752 kubelet[1930]: I0517 00:43:52.744966 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/edfc8f67-761b-4428-b703-bd8f02b95a90-calico-apiserver-certs\") pod \"calico-apiserver-65f5b4d999-8lqmt\" (UID: \"edfc8f67-761b-4428-b703-bd8f02b95a90\") " pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" May 17 00:43:52.891354 env[1190]: time="2025-05-17T00:43:52.891224220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6984db5bf8-ssqjf,Uid:c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1,Namespace:calico-system,Attempt:0,}" May 17 00:43:52.900502 kubelet[1930]: E0517 00:43:52.900465 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:52.901417 env[1190]: time="2025-05-17T00:43:52.901141466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-mg4ql,Uid:73b60263-1259-4e7b-9da7-c18fb7cb6fd2,Namespace:kube-system,Attempt:0,}" May 17 00:43:52.913880 kubelet[1930]: E0517 00:43:52.913844 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:52.921170 env[1190]: time="2025-05-17T00:43:52.921115851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hhhm4,Uid:d0ccdba1-af4b-4719-bc28-bd16d9c3505b,Namespace:kube-system,Attempt:0,}" May 17 00:43:52.934623 env[1190]: time="2025-05-17T00:43:52.934507923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-h99gw,Uid:8afe8629-8ece-4e93-aff0-9b5c027ae04a,Namespace:calico-apiserver,Attempt:0,}" May 17 00:43:52.940430 env[1190]: time="2025-05-17T00:43:52.940384417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-f6rvs,Uid:e451f6f0-3693-459e-a9c7-dc41b8be0c59,Namespace:calico-system,Attempt:0,}" May 17 00:43:52.948891 env[1190]: time="2025-05-17T00:43:52.948838338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6566dbf9b5-l8nkk,Uid:22e3aaa2-8915-424c-bdd8-d3b8cb1b394d,Namespace:calico-system,Attempt:0,}" May 17 00:43:52.962393 env[1190]: time="2025-05-17T00:43:52.962347302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-8lqmt,Uid:edfc8f67-761b-4428-b703-bd8f02b95a90,Namespace:calico-apiserver,Attempt:0,}" May 17 00:43:53.220394 env[1190]: time="2025-05-17T00:43:53.217436863Z" level=error msg="Failed to destroy network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.220394 env[1190]: time="2025-05-17T00:43:53.218166536Z" level=error msg="encountered an error cleaning up failed sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.220394 env[1190]: time="2025-05-17T00:43:53.218275198Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hhhm4,Uid:d0ccdba1-af4b-4719-bc28-bd16d9c3505b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.220765 kubelet[1930]: E0517 00:43:53.218754 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.220765 kubelet[1930]: E0517 00:43:53.218881 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hhhm4" May 17 00:43:53.220765 kubelet[1930]: E0517 00:43:53.218938 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hhhm4" May 17 00:43:53.222731 kubelet[1930]: E0517 00:43:53.219031 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-hhhm4_kube-system(d0ccdba1-af4b-4719-bc28-bd16d9c3505b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-hhhm4_kube-system(d0ccdba1-af4b-4719-bc28-bd16d9c3505b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hhhm4" podUID="d0ccdba1-af4b-4719-bc28-bd16d9c3505b" May 17 00:43:53.240869 env[1190]: time="2025-05-17T00:43:53.240796056Z" level=error msg="Failed to destroy network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.241672 env[1190]: time="2025-05-17T00:43:53.241587802Z" level=error msg="encountered an error cleaning up failed sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.241915 env[1190]: time="2025-05-17T00:43:53.241873485Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-mg4ql,Uid:73b60263-1259-4e7b-9da7-c18fb7cb6fd2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.243653 kubelet[1930]: E0517 00:43:53.242283 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.243653 kubelet[1930]: E0517 00:43:53.242386 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-mg4ql" May 17 00:43:53.243653 kubelet[1930]: E0517 00:43:53.242419 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-mg4ql" May 17 00:43:53.243948 kubelet[1930]: E0517 00:43:53.242478 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-mg4ql_kube-system(73b60263-1259-4e7b-9da7-c18fb7cb6fd2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-mg4ql_kube-system(73b60263-1259-4e7b-9da7-c18fb7cb6fd2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-mg4ql" podUID="73b60263-1259-4e7b-9da7-c18fb7cb6fd2" May 17 00:43:53.292419 kubelet[1930]: I0517 00:43:53.291679 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:43:53.293677 env[1190]: time="2025-05-17T00:43:53.293632789Z" level=info msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" May 17 00:43:53.303641 env[1190]: time="2025-05-17T00:43:53.303586895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:43:53.310375 kubelet[1930]: I0517 00:43:53.310339 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:43:53.312232 env[1190]: time="2025-05-17T00:43:53.312167743Z" level=error msg="Failed to destroy network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.313053 env[1190]: time="2025-05-17T00:43:53.313014357Z" level=info msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" May 17 00:43:53.313880 env[1190]: time="2025-05-17T00:43:53.313740994Z" level=error msg="encountered an error cleaning up failed sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.313880 env[1190]: time="2025-05-17T00:43:53.313815345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-f6rvs,Uid:e451f6f0-3693-459e-a9c7-dc41b8be0c59,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.314920 kubelet[1930]: E0517 00:43:53.314869 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.315070 kubelet[1930]: E0517 00:43:53.314965 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:53.315190 kubelet[1930]: E0517 00:43:53.315020 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-f6rvs" May 17 00:43:53.315297 kubelet[1930]: E0517 00:43:53.315232 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-f6rvs_calico-system(e451f6f0-3693-459e-a9c7-dc41b8be0c59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-f6rvs_calico-system(e451f6f0-3693-459e-a9c7-dc41b8be0c59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:43:53.326665 env[1190]: time="2025-05-17T00:43:53.326587362Z" level=error msg="Failed to destroy network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.327861 env[1190]: time="2025-05-17T00:43:53.327796205Z" level=error msg="encountered an error cleaning up failed sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.328011 env[1190]: time="2025-05-17T00:43:53.327919065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-h99gw,Uid:8afe8629-8ece-4e93-aff0-9b5c027ae04a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.328264 kubelet[1930]: E0517 00:43:53.328217 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.328907 kubelet[1930]: E0517 00:43:53.328859 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" May 17 00:43:53.329018 kubelet[1930]: E0517 00:43:53.328909 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" May 17 00:43:53.329018 kubelet[1930]: E0517 00:43:53.328978 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65f5b4d999-h99gw_calico-apiserver(8afe8629-8ece-4e93-aff0-9b5c027ae04a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65f5b4d999-h99gw_calico-apiserver(8afe8629-8ece-4e93-aff0-9b5c027ae04a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" podUID="8afe8629-8ece-4e93-aff0-9b5c027ae04a" May 17 00:43:53.346316 env[1190]: time="2025-05-17T00:43:53.346229474Z" level=error msg="Failed to destroy network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.346914 env[1190]: time="2025-05-17T00:43:53.346820867Z" level=error msg="encountered an error cleaning up failed sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.347043 env[1190]: time="2025-05-17T00:43:53.346904492Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6984db5bf8-ssqjf,Uid:c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.349272 kubelet[1930]: E0517 00:43:53.349221 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.349423 kubelet[1930]: E0517 00:43:53.349360 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" May 17 00:43:53.349423 kubelet[1930]: E0517 00:43:53.349400 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" May 17 00:43:53.349586 kubelet[1930]: E0517 00:43:53.349549 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6984db5bf8-ssqjf_calico-system(c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6984db5bf8-ssqjf_calico-system(c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" podUID="c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1" May 17 00:43:53.366236 env[1190]: time="2025-05-17T00:43:53.366152769Z" level=error msg="Failed to destroy network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.366724 env[1190]: time="2025-05-17T00:43:53.366669398Z" level=error msg="encountered an error cleaning up failed sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.366848 env[1190]: time="2025-05-17T00:43:53.366752869Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-8lqmt,Uid:edfc8f67-761b-4428-b703-bd8f02b95a90,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.367152 kubelet[1930]: E0517 00:43:53.367093 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.367252 kubelet[1930]: E0517 00:43:53.367187 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" May 17 00:43:53.367252 kubelet[1930]: E0517 00:43:53.367239 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" May 17 00:43:53.367505 kubelet[1930]: E0517 00:43:53.367343 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65f5b4d999-8lqmt_calico-apiserver(edfc8f67-761b-4428-b703-bd8f02b95a90)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65f5b4d999-8lqmt_calico-apiserver(edfc8f67-761b-4428-b703-bd8f02b95a90)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" podUID="edfc8f67-761b-4428-b703-bd8f02b95a90" May 17 00:43:53.379884 env[1190]: time="2025-05-17T00:43:53.379809338Z" level=error msg="Failed to destroy network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.380381 env[1190]: time="2025-05-17T00:43:53.380277283Z" level=error msg="encountered an error cleaning up failed sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.380597 env[1190]: time="2025-05-17T00:43:53.380434625Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6566dbf9b5-l8nkk,Uid:22e3aaa2-8915-424c-bdd8-d3b8cb1b394d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.380803 kubelet[1930]: E0517 00:43:53.380751 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.380895 kubelet[1930]: E0517 00:43:53.380849 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6566dbf9b5-l8nkk" May 17 00:43:53.380953 kubelet[1930]: E0517 00:43:53.380883 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6566dbf9b5-l8nkk" May 17 00:43:53.381008 kubelet[1930]: E0517 00:43:53.380962 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6566dbf9b5-l8nkk_calico-system(22e3aaa2-8915-424c-bdd8-d3b8cb1b394d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6566dbf9b5-l8nkk_calico-system(22e3aaa2-8915-424c-bdd8-d3b8cb1b394d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6566dbf9b5-l8nkk" podUID="22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" May 17 00:43:53.413652 env[1190]: time="2025-05-17T00:43:53.413567166Z" level=error msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" failed" error="failed to destroy network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.413997 kubelet[1930]: E0517 00:43:53.413950 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:43:53.414246 kubelet[1930]: E0517 00:43:53.414052 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09"} May 17 00:43:53.414356 kubelet[1930]: E0517 00:43:53.414255 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d0ccdba1-af4b-4719-bc28-bd16d9c3505b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:53.414471 kubelet[1930]: E0517 00:43:53.414331 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d0ccdba1-af4b-4719-bc28-bd16d9c3505b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hhhm4" podUID="d0ccdba1-af4b-4719-bc28-bd16d9c3505b" May 17 00:43:53.426918 env[1190]: time="2025-05-17T00:43:53.426826293Z" level=error msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" failed" error="failed to destroy network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:53.427242 kubelet[1930]: E0517 00:43:53.427185 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:43:53.427418 kubelet[1930]: E0517 00:43:53.427276 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5"} May 17 00:43:53.427418 kubelet[1930]: E0517 00:43:53.427362 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73b60263-1259-4e7b-9da7-c18fb7cb6fd2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:53.427596 kubelet[1930]: E0517 00:43:53.427429 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73b60263-1259-4e7b-9da7-c18fb7cb6fd2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-mg4ql" podUID="73b60263-1259-4e7b-9da7-c18fb7cb6fd2" May 17 00:43:54.144794 systemd[1]: Created slice kubepods-besteffort-pod4012fc42_c091_49aa_9549_82c50f8e5fa6.slice. May 17 00:43:54.147856 env[1190]: time="2025-05-17T00:43:54.147809262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5dcv,Uid:4012fc42-c091-49aa-9549-82c50f8e5fa6,Namespace:calico-system,Attempt:0,}" May 17 00:43:54.238685 env[1190]: time="2025-05-17T00:43:54.238605334Z" level=error msg="Failed to destroy network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.243950 env[1190]: time="2025-05-17T00:43:54.242365074Z" level=error msg="encountered an error cleaning up failed sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.243950 env[1190]: time="2025-05-17T00:43:54.242446585Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5dcv,Uid:4012fc42-c091-49aa-9549-82c50f8e5fa6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.241324 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f-shm.mount: Deactivated successfully. May 17 00:43:54.245324 kubelet[1930]: E0517 00:43:54.244577 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.245324 kubelet[1930]: E0517 00:43:54.244687 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:54.245324 kubelet[1930]: E0517 00:43:54.244740 1930 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f5dcv" May 17 00:43:54.245760 kubelet[1930]: E0517 00:43:54.244840 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f5dcv_calico-system(4012fc42-c091-49aa-9549-82c50f8e5fa6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f5dcv_calico-system(4012fc42-c091-49aa-9549-82c50f8e5fa6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:54.314386 kubelet[1930]: I0517 00:43:54.314347 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:43:54.317381 env[1190]: time="2025-05-17T00:43:54.317338660Z" level=info msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" May 17 00:43:54.318588 kubelet[1930]: I0517 00:43:54.318103 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:43:54.319257 env[1190]: time="2025-05-17T00:43:54.318924528Z" level=info msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" May 17 00:43:54.321275 kubelet[1930]: I0517 00:43:54.321161 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:43:54.322496 env[1190]: time="2025-05-17T00:43:54.322448334Z" level=info msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" May 17 00:43:54.327562 kubelet[1930]: I0517 00:43:54.327522 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:43:54.329006 env[1190]: time="2025-05-17T00:43:54.328961795Z" level=info msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" May 17 00:43:54.329868 kubelet[1930]: I0517 00:43:54.329797 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:43:54.330684 env[1190]: time="2025-05-17T00:43:54.330630009Z" level=info msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" May 17 00:43:54.332025 kubelet[1930]: I0517 00:43:54.331993 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:43:54.332644 env[1190]: time="2025-05-17T00:43:54.332619505Z" level=info msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" May 17 00:43:54.457365 env[1190]: time="2025-05-17T00:43:54.456615877Z" level=error msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" failed" error="failed to destroy network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.458058 kubelet[1930]: E0517 00:43:54.457883 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:43:54.458058 kubelet[1930]: E0517 00:43:54.457953 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d"} May 17 00:43:54.458058 kubelet[1930]: E0517 00:43:54.457993 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8afe8629-8ece-4e93-aff0-9b5c027ae04a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.458058 kubelet[1930]: E0517 00:43:54.458021 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8afe8629-8ece-4e93-aff0-9b5c027ae04a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" podUID="8afe8629-8ece-4e93-aff0-9b5c027ae04a" May 17 00:43:54.465030 env[1190]: time="2025-05-17T00:43:54.464969391Z" level=error msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" failed" error="failed to destroy network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.465412 kubelet[1930]: E0517 00:43:54.465357 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:43:54.465520 kubelet[1930]: E0517 00:43:54.465427 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501"} May 17 00:43:54.465520 kubelet[1930]: E0517 00:43:54.465476 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.465520 kubelet[1930]: E0517 00:43:54.465504 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6566dbf9b5-l8nkk" podUID="22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" May 17 00:43:54.472419 env[1190]: time="2025-05-17T00:43:54.472354061Z" level=error msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" failed" error="failed to destroy network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.472875 kubelet[1930]: E0517 00:43:54.472786 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:43:54.472982 kubelet[1930]: E0517 00:43:54.472889 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f"} May 17 00:43:54.472982 kubelet[1930]: E0517 00:43:54.472963 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4012fc42-c091-49aa-9549-82c50f8e5fa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.473134 kubelet[1930]: E0517 00:43:54.473017 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4012fc42-c091-49aa-9549-82c50f8e5fa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f5dcv" podUID="4012fc42-c091-49aa-9549-82c50f8e5fa6" May 17 00:43:54.492903 env[1190]: time="2025-05-17T00:43:54.492842313Z" level=error msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" failed" error="failed to destroy network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.493537 kubelet[1930]: E0517 00:43:54.493391 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:43:54.493537 kubelet[1930]: E0517 00:43:54.493442 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5"} May 17 00:43:54.493537 kubelet[1930]: E0517 00:43:54.493482 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"edfc8f67-761b-4428-b703-bd8f02b95a90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.493537 kubelet[1930]: E0517 00:43:54.493505 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"edfc8f67-761b-4428-b703-bd8f02b95a90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" podUID="edfc8f67-761b-4428-b703-bd8f02b95a90" May 17 00:43:54.494146 env[1190]: time="2025-05-17T00:43:54.494108939Z" level=error msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" failed" error="failed to destroy network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.494501 kubelet[1930]: E0517 00:43:54.494447 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:43:54.494608 kubelet[1930]: E0517 00:43:54.494502 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e"} May 17 00:43:54.494608 kubelet[1930]: E0517 00:43:54.494549 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.494608 kubelet[1930]: E0517 00:43:54.494587 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e451f6f0-3693-459e-a9c7-dc41b8be0c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:43:54.495395 env[1190]: time="2025-05-17T00:43:54.495358077Z" level=error msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" failed" error="failed to destroy network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:54.495734 kubelet[1930]: E0517 00:43:54.495618 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:43:54.495734 kubelet[1930]: E0517 00:43:54.495655 1930 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138"} May 17 00:43:54.495734 kubelet[1930]: E0517 00:43:54.495681 1930 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:54.495734 kubelet[1930]: E0517 00:43:54.495702 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" podUID="c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1" May 17 00:43:55.839614 kubelet[1930]: I0517 00:43:55.838741 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:55.845116 kubelet[1930]: E0517 00:43:55.845074 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:55.933000 audit[3005]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:55.933000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffda32e2590 a2=0 a3=7ffda32e257c items=0 ppid=2028 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:55.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:55.937000 audit[3005]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:55.937000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffda32e2590 a2=0 a3=7ffda32e257c items=0 ppid=2028 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:55.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:56.345757 kubelet[1930]: E0517 00:43:56.345713 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:59.941034 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3440890338.mount: Deactivated successfully. May 17 00:43:59.989281 env[1190]: time="2025-05-17T00:43:59.989194566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:59.992273 env[1190]: time="2025-05-17T00:43:59.991116981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:59.997600 env[1190]: time="2025-05-17T00:43:59.997436037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:00.001950 env[1190]: time="2025-05-17T00:44:00.001892690Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:00.002461 env[1190]: time="2025-05-17T00:44:00.002419149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:44:00.055428 env[1190]: time="2025-05-17T00:44:00.055179212Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:44:00.096206 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2758257264.mount: Deactivated successfully. May 17 00:44:00.121607 env[1190]: time="2025-05-17T00:44:00.121542140Z" level=info msg="CreateContainer within sandbox \"b8b28c308286a13a8d0d3eaf4d0e1c0bc4c91850e1b24b36861ea4b1758788a8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1\"" May 17 00:44:00.122925 env[1190]: time="2025-05-17T00:44:00.122868016Z" level=info msg="StartContainer for \"d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1\"" May 17 00:44:00.160841 systemd[1]: Started cri-containerd-d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1.scope. May 17 00:44:00.240000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.243438 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:44:00.244243 kernel: audit: type=1400 audit(1747442640.240:1021): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.240000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc76abc82f8 items=0 ppid=2374 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363561313865383666393135333965666230393564666538393537 May 17 00:44:00.262841 kernel: audit: type=1300 audit(1747442640.240:1021): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc76abc82f8 items=0 ppid=2374 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:00.263115 kernel: audit: type=1327 audit(1747442640.240:1021): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363561313865383666393135333965666230393564666538393537 May 17 00:44:00.263359 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.269881 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.275513 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.284189 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.284629 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.284710 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.291146 kernel: audit: type=1400 audit(1747442640.242:1022): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.242000 audit: BPF prog-id=139 op=LOAD May 17 00:44:00.242000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025468 items=0 ppid=2374 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363561313865383666393135333965666230393564666538393537 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit: BPF prog-id=140 op=LOAD May 17 00:44:00.246000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000254b8 items=0 ppid=2374 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:00.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363561313865383666393135333965666230393564666538393537 May 17 00:44:00.246000 audit: BPF prog-id=140 op=UNLOAD May 17 00:44:00.246000 audit: BPF prog-id=139 op=UNLOAD May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:00.246000 audit: BPF prog-id=141 op=LOAD May 17 00:44:00.246000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000025548 items=0 ppid=2374 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:00.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363561313865383666393135333965666230393564666538393537 May 17 00:44:00.312878 env[1190]: time="2025-05-17T00:44:00.312779357Z" level=info msg="StartContainer for \"d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1\" returns successfully" May 17 00:44:00.416505 kubelet[1930]: I0517 00:44:00.412053 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-d9hk9" podStartSLOduration=1.165876086 podStartE2EDuration="16.40568278s" podCreationTimestamp="2025-05-17 00:43:44 +0000 UTC" firstStartedPulling="2025-05-17 00:43:44.763902946 +0000 UTC m=+19.824189742" lastFinishedPulling="2025-05-17 00:44:00.003709636 +0000 UTC m=+35.063996436" observedRunningTime="2025-05-17 00:44:00.397185975 +0000 UTC m=+35.457472789" watchObservedRunningTime="2025-05-17 00:44:00.40568278 +0000 UTC m=+35.465969588" May 17 00:44:00.641234 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:44:00.641516 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:44:01.029273 env[1190]: time="2025-05-17T00:44:01.028698937Z" level=info msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.171 [INFO][3117] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.172 [INFO][3117] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" iface="eth0" netns="/var/run/netns/cni-6508612d-6551-4da2-bd19-16eed0441250" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.172 [INFO][3117] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" iface="eth0" netns="/var/run/netns/cni-6508612d-6551-4da2-bd19-16eed0441250" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.173 [INFO][3117] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" iface="eth0" netns="/var/run/netns/cni-6508612d-6551-4da2-bd19-16eed0441250" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.173 [INFO][3117] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.173 [INFO][3117] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.371 [INFO][3124] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.373 [INFO][3124] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.374 [INFO][3124] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.401 [WARNING][3124] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.401 [INFO][3124] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.416 [INFO][3124] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:01.430595 env[1190]: 2025-05-17 00:44:01.425 [INFO][3117] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:01.435032 systemd[1]: run-containerd-runc-k8s.io-d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1-runc.37AwFR.mount: Deactivated successfully. May 17 00:44:01.435162 systemd[1]: run-netns-cni\x2d6508612d\x2d6551\x2d4da2\x2dbd19\x2d16eed0441250.mount: Deactivated successfully. May 17 00:44:01.436625 env[1190]: time="2025-05-17T00:44:01.436570145Z" level=info msg="TearDown network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" successfully" May 17 00:44:01.436827 env[1190]: time="2025-05-17T00:44:01.436799407Z" level=info msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" returns successfully" May 17 00:44:01.616654 kubelet[1930]: I0517 00:44:01.616577 1930 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kcc4w\" (UniqueName: \"kubernetes.io/projected/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-kube-api-access-kcc4w\") pod \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " May 17 00:44:01.627843 kubelet[1930]: I0517 00:44:01.627780 1930 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-ca-bundle\") pod \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " May 17 00:44:01.627843 kubelet[1930]: I0517 00:44:01.627847 1930 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-backend-key-pair\") pod \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\" (UID: \"22e3aaa2-8915-424c-bdd8-d3b8cb1b394d\") " May 17 00:44:01.637536 systemd[1]: var-lib-kubelet-pods-22e3aaa2\x2d8915\x2d424c\x2dbdd8\x2dd3b8cb1b394d-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:44:01.643645 kubelet[1930]: I0517 00:44:01.643545 1930 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" (UID: "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:44:01.644190 kubelet[1930]: I0517 00:44:01.644144 1930 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" (UID: "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:44:01.645106 kubelet[1930]: I0517 00:44:01.645043 1930 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-kube-api-access-kcc4w" (OuterVolumeSpecName: "kube-api-access-kcc4w") pod "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" (UID: "22e3aaa2-8915-424c-bdd8-d3b8cb1b394d"). InnerVolumeSpecName "kube-api-access-kcc4w". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:44:01.729425 kubelet[1930]: I0517 00:44:01.728779 1930 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-kcc4w\" (UniqueName: \"kubernetes.io/projected/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-kube-api-access-kcc4w\") on node \"ci-3510.3.7-n-f9c20123e0\" DevicePath \"\"" May 17 00:44:01.729425 kubelet[1930]: I0517 00:44:01.728832 1930 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-ca-bundle\") on node \"ci-3510.3.7-n-f9c20123e0\" DevicePath \"\"" May 17 00:44:01.729425 kubelet[1930]: I0517 00:44:01.728856 1930 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-f9c20123e0\" DevicePath \"\"" May 17 00:44:01.941891 systemd[1]: var-lib-kubelet-pods-22e3aaa2\x2d8915\x2d424c\x2dbdd8\x2dd3b8cb1b394d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkcc4w.mount: Deactivated successfully. May 17 00:44:02.374816 systemd[1]: Removed slice kubepods-besteffort-pod22e3aaa2_8915_424c_bdd8_d3b8cb1b394d.slice. May 17 00:44:02.404528 systemd[1]: run-containerd-runc-k8s.io-d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1-runc.ZVsbNU.mount: Deactivated successfully. May 17 00:44:02.538700 kubelet[1930]: I0517 00:44:02.538632 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pv9tm\" (UniqueName: \"kubernetes.io/projected/4d8c4277-da20-438f-8d02-ea4cd9187785-kube-api-access-pv9tm\") pod \"whisker-d7c97c5f7-vrsb5\" (UID: \"4d8c4277-da20-438f-8d02-ea4cd9187785\") " pod="calico-system/whisker-d7c97c5f7-vrsb5" May 17 00:44:02.538700 kubelet[1930]: I0517 00:44:02.538710 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/4d8c4277-da20-438f-8d02-ea4cd9187785-whisker-backend-key-pair\") pod \"whisker-d7c97c5f7-vrsb5\" (UID: \"4d8c4277-da20-438f-8d02-ea4cd9187785\") " pod="calico-system/whisker-d7c97c5f7-vrsb5" May 17 00:44:02.539027 kubelet[1930]: I0517 00:44:02.538744 1930 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4d8c4277-da20-438f-8d02-ea4cd9187785-whisker-ca-bundle\") pod \"whisker-d7c97c5f7-vrsb5\" (UID: \"4d8c4277-da20-438f-8d02-ea4cd9187785\") " pod="calico-system/whisker-d7c97c5f7-vrsb5" May 17 00:44:02.563234 systemd[1]: Created slice kubepods-besteffort-pod4d8c4277_da20_438f_8d02_ea4cd9187785.slice. May 17 00:44:02.716000 audit[3240]: AVC avc: denied { write } for pid=3240 comm="tee" name="fd" dev="proc" ino=24843 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.716000 audit[3240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6a9fb7c0 a2=241 a3=1b6 items=1 ppid=3201 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.716000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:44:02.716000 audit: PATH item=0 name="/dev/fd/63" inode=24483 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.716000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.769000 audit[3243]: AVC avc: denied { write } for pid=3243 comm="tee" name="fd" dev="proc" ino=24516 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.769000 audit[3243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb933e7c0 a2=241 a3=1b6 items=1 ppid=3199 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.769000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:44:02.769000 audit: PATH item=0 name="/dev/fd/63" inode=24486 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.772000 audit[3246]: AVC avc: denied { write } for pid=3246 comm="tee" name="fd" dev="proc" ino=24518 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.772000 audit[3246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc39657c2 a2=241 a3=1b6 items=1 ppid=3202 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.772000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:44:02.772000 audit: PATH item=0 name="/dev/fd/63" inode=24495 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.776000 audit[3248]: AVC avc: denied { write } for pid=3248 comm="tee" name="fd" dev="proc" ino=24522 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.776000 audit[3248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1d59a7c0 a2=241 a3=1b6 items=1 ppid=3205 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.776000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:44:02.776000 audit: PATH item=0 name="/dev/fd/63" inode=24502 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.787000 audit[3260]: AVC avc: denied { write } for pid=3260 comm="tee" name="fd" dev="proc" ino=24853 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.787000 audit[3260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe42e3b7b0 a2=241 a3=1b6 items=1 ppid=3218 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.787000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:44:02.787000 audit: PATH item=0 name="/dev/fd/63" inode=24524 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.787000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.790000 audit[3255]: AVC avc: denied { write } for pid=3255 comm="tee" name="fd" dev="proc" ino=24527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.793000 audit[3257]: AVC avc: denied { write } for pid=3257 comm="tee" name="fd" dev="proc" ino=24531 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:44:02.793000 audit[3257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd53fb7b1 a2=241 a3=1b6 items=1 ppid=3203 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.793000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:44:02.793000 audit: PATH item=0 name="/dev/fd/63" inode=24850 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.790000 audit[3255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe64ad7c1 a2=241 a3=1b6 items=1 ppid=3204 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:02.790000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:44:02.790000 audit: PATH item=0 name="/dev/fd/63" inode=24509 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:02.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.793000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:44:02.878783 env[1190]: time="2025-05-17T00:44:02.878111172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-d7c97c5f7-vrsb5,Uid:4d8c4277-da20-438f-8d02-ea4cd9187785,Namespace:calico-system,Attempt:0,}" May 17 00:44:03.144065 kubelet[1930]: I0517 00:44:03.143689 1930 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="22e3aaa2-8915-424c-bdd8-d3b8cb1b394d" path="/var/lib/kubelet/pods/22e3aaa2-8915-424c-bdd8-d3b8cb1b394d/volumes" May 17 00:44:03.172426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:44:03.172614 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliace1d103894: link becomes ready May 17 00:44:03.179244 systemd-networkd[1005]: caliace1d103894: Link UP May 17 00:44:03.179576 systemd-networkd[1005]: caliace1d103894: Gained carrier May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:02.970 [INFO][3279] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:02.996 [INFO][3279] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0 whisker-d7c97c5f7- calico-system 4d8c4277-da20-438f-8d02-ea4cd9187785 898 0 2025-05-17 00:44:02 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:d7c97c5f7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 whisker-d7c97c5f7-vrsb5 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] caliace1d103894 [] [] }} ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:02.996 [INFO][3279] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.071 [INFO][3292] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" HandleID="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.071 [INFO][3292] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" HandleID="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"whisker-d7c97c5f7-vrsb5", "timestamp":"2025-05-17 00:44:03.070982043 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.071 [INFO][3292] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.071 [INFO][3292] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.071 [INFO][3292] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.082 [INFO][3292] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.098 [INFO][3292] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.113 [INFO][3292] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.117 [INFO][3292] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.121 [INFO][3292] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.122 [INFO][3292] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.126 [INFO][3292] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644 May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.132 [INFO][3292] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.147 [INFO][3292] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.1/26] block=192.168.35.0/26 handle="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.147 [INFO][3292] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.1/26] handle="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.147 [INFO][3292] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:03.215222 env[1190]: 2025-05-17 00:44:03.147 [INFO][3292] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.1/26] IPv6=[] ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" HandleID="k8s-pod-network.16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.151 [INFO][3279] cni-plugin/k8s.go 418: Populated endpoint ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0", GenerateName:"whisker-d7c97c5f7-", Namespace:"calico-system", SelfLink:"", UID:"4d8c4277-da20-438f-8d02-ea4cd9187785", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 44, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"d7c97c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"whisker-d7c97c5f7-vrsb5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"caliace1d103894", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.151 [INFO][3279] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.1/32] ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.152 [INFO][3279] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliace1d103894 ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.174 [INFO][3279] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.174 [INFO][3279] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0", GenerateName:"whisker-d7c97c5f7-", Namespace:"calico-system", SelfLink:"", UID:"4d8c4277-da20-438f-8d02-ea4cd9187785", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 44, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"d7c97c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644", Pod:"whisker-d7c97c5f7-vrsb5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.35.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"caliace1d103894", MAC:"86:4b:15:31:bf:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:03.217170 env[1190]: 2025-05-17 00:44:03.206 [INFO][3279] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644" Namespace="calico-system" Pod="whisker-d7c97c5f7-vrsb5" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--d7c97c5f7--vrsb5-eth0" May 17 00:44:03.244252 env[1190]: time="2025-05-17T00:44:03.244124505Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:03.244492 env[1190]: time="2025-05-17T00:44:03.244265095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:03.244492 env[1190]: time="2025-05-17T00:44:03.244330920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:03.245084 env[1190]: time="2025-05-17T00:44:03.245007187Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644 pid=3314 runtime=io.containerd.runc.v2 May 17 00:44:03.279770 systemd[1]: Started cri-containerd-16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644.scope. May 17 00:44:03.298026 systemd[1]: run-containerd-runc-k8s.io-16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644-runc.Rrb5Xz.mount: Deactivated successfully. May 17 00:44:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.338000 audit: BPF prog-id=142 op=LOAD May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3314 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623165653764363836363333616636643536633765376535663166 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3314 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623165653764363836363333616636643536633765376535663166 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit: BPF prog-id=143 op=LOAD May 17 00:44:03.340000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000285040 items=0 ppid=3314 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623165653764363836363333616636643536633765376535663166 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit: BPF prog-id=144 op=LOAD May 17 00:44:03.340000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000285088 items=0 ppid=3314 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623165653764363836363333616636643536633765376535663166 May 17 00:44:03.340000 audit: BPF prog-id=144 op=UNLOAD May 17 00:44:03.340000 audit: BPF prog-id=143 op=UNLOAD May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.340000 audit: BPF prog-id=145 op=LOAD May 17 00:44:03.340000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000285498 items=0 ppid=3314 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623165653764363836363333616636643536633765376535663166 May 17 00:44:03.402769 env[1190]: time="2025-05-17T00:44:03.402608505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-d7c97c5f7-vrsb5,Uid:4d8c4277-da20-438f-8d02-ea4cd9187785,Namespace:calico-system,Attempt:0,} returns sandbox id \"16b1ee7d686633af6d56c7e7e5f1f3a7f6cd9aaa80d684168fe53c5bcb2be644\"" May 17 00:44:03.414138 env[1190]: time="2025-05-17T00:44:03.414087149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:44:03.630000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.630000 audit: BPF prog-id=146 op=LOAD May 17 00:44:03.630000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb3b86550 a2=98 a3=3 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.630000 audit: BPF prog-id=146 op=UNLOAD May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit: BPF prog-id=147 op=LOAD May 17 00:44:03.631000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb3b86340 a2=94 a3=54428f items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.631000 audit: BPF prog-id=147 op=UNLOAD May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.631000 audit: BPF prog-id=148 op=LOAD May 17 00:44:03.631000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb3b86370 a2=94 a3=2 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.631000 audit: BPF prog-id=148 op=UNLOAD May 17 00:44:03.644731 env[1190]: time="2025-05-17T00:44:03.644647875Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:03.645993 env[1190]: time="2025-05-17T00:44:03.645868416Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:03.648987 kubelet[1930]: E0517 00:44:03.648738 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:03.648987 kubelet[1930]: E0517 00:44:03.648867 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:03.660162 kubelet[1930]: E0517 00:44:03.659110 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c2812b6c12664ddd8ce606719b2bc444,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:03.663276 env[1190]: time="2025-05-17T00:44:03.663204138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:44:03.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit: BPF prog-id=149 op=LOAD May 17 00:44:03.799000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb3b86230 a2=94 a3=1 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.799000 audit: BPF prog-id=149 op=UNLOAD May 17 00:44:03.799000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.799000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb3b86300 a2=50 a3=7ffdb3b863e0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b86240 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3b86270 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3b86180 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b86290 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b86270 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b86260 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b86290 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3b86270 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3b86290 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3b86260 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.812000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.812000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3b862d0 a2=28 a3=0 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb3b86080 a2=50 a3=1 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit: BPF prog-id=150 op=LOAD May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb3b86080 a2=94 a3=5 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit: BPF prog-id=150 op=UNLOAD May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb3b86130 a2=50 a3=1 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb3b86250 a2=4 a3=38 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { confidentiality } for pid=3378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3b862a0 a2=94 a3=6 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.813000 audit[3378]: AVC avc: denied { confidentiality } for pid=3378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.813000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3b85a50 a2=94 a3=88 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.814000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.814000 audit[3378]: AVC avc: denied { confidentiality } for pid=3378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.814000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3b85a50 a2=94 a3=88 items=0 ppid=3200 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.814000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:44:03.825000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.825000 audit: BPF prog-id=151 op=LOAD May 17 00:44:03.825000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc30f583d0 a2=98 a3=1999999999999999 items=0 ppid=3200 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.825000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:44:03.826000 audit: BPF prog-id=151 op=UNLOAD May 17 00:44:03.826000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.826000 audit: BPF prog-id=152 op=LOAD May 17 00:44:03.826000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc30f582b0 a2=94 a3=ffff items=0 ppid=3200 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:44:03.827000 audit: BPF prog-id=152 op=UNLOAD May 17 00:44:03.827000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.827000 audit: BPF prog-id=153 op=LOAD May 17 00:44:03.827000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc30f582f0 a2=94 a3=7ffc30f584d0 items=0 ppid=3200 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.827000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:44:03.828000 audit: BPF prog-id=153 op=UNLOAD May 17 00:44:03.880856 env[1190]: time="2025-05-17T00:44:03.880773912Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:03.882155 env[1190]: time="2025-05-17T00:44:03.882091341Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:03.882939 kubelet[1930]: E0517 00:44:03.882633 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:03.882939 kubelet[1930]: E0517 00:44:03.882709 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:03.883216 kubelet[1930]: E0517 00:44:03.882870 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:03.884413 kubelet[1930]: E0517 00:44:03.884345 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:03.922973 systemd-networkd[1005]: vxlan.calico: Link UP May 17 00:44:03.922984 systemd-networkd[1005]: vxlan.calico: Gained carrier May 17 00:44:03.958000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.958000 audit: BPF prog-id=154 op=LOAD May 17 00:44:03.958000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca9ce3150 a2=98 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.959000 audit: BPF prog-id=154 op=UNLOAD May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit: BPF prog-id=155 op=LOAD May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca9ce2f60 a2=94 a3=54428f items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit: BPF prog-id=155 op=UNLOAD May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit: BPF prog-id=156 op=LOAD May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca9ce2f90 a2=94 a3=2 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit: BPF prog-id=156 op=UNLOAD May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2e60 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9ce2e90 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9ce2da0 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2eb0 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2e90 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2e80 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2eb0 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9ce2e90 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9ce2eb0 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9ce2e80 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffca9ce2ef0 a2=28 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.965000 audit: BPF prog-id=157 op=LOAD May 17 00:44:03.965000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca9ce2d60 a2=94 a3=0 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.965000 audit: BPF prog-id=157 op=UNLOAD May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffca9ce2d50 a2=50 a3=2800 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffca9ce2d50 a2=50 a3=2800 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit: BPF prog-id=158 op=LOAD May 17 00:44:03.966000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca9ce2570 a2=94 a3=2 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.966000 audit: BPF prog-id=158 op=UNLOAD May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.966000 audit: BPF prog-id=159 op=LOAD May 17 00:44:03.966000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca9ce2670 a2=94 a3=30 items=0 ppid=3200 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit: BPF prog-id=160 op=LOAD May 17 00:44:03.975000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc826f4530 a2=98 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:03.975000 audit: BPF prog-id=160 op=UNLOAD May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit: BPF prog-id=161 op=LOAD May 17 00:44:03.975000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc826f4320 a2=94 a3=54428f items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:03.975000 audit: BPF prog-id=161 op=UNLOAD May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:03.975000 audit: BPF prog-id=162 op=LOAD May 17 00:44:03.975000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc826f4350 a2=94 a3=2 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:03.975000 audit: BPF prog-id=162 op=UNLOAD May 17 00:44:04.135000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.135000 audit: BPF prog-id=163 op=LOAD May 17 00:44:04.135000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc826f4210 a2=94 a3=1 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.137000 audit: BPF prog-id=163 op=UNLOAD May 17 00:44:04.137000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.137000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc826f42e0 a2=50 a3=7ffc826f43c0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.151000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.151000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f4220 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.152000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.152000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc826f4250 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.152000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.152000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.152000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc826f4160 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.152000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.152000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.152000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f4270 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.152000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.153000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.153000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f4250 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.153000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.153000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f4240 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.153000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.153000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f4270 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.154000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.154000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc826f4250 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.154000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.154000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc826f4270 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.154000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.154000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc826f4240 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc826f42b0 a2=28 a3=0 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.155000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc826f4060 a2=50 a3=1 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.155000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.155000 audit: BPF prog-id=164 op=LOAD May 17 00:44:04.155000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc826f4060 a2=94 a3=5 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.155000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.156000 audit: BPF prog-id=164 op=UNLOAD May 17 00:44:04.156000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.156000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc826f4110 a2=50 a3=1 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.156000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc826f4230 a2=4 a3=38 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.157000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.157000 audit[3412]: AVC avc: denied { confidentiality } for pid=3412 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.157000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc826f4280 a2=94 a3=6 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.157000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { confidentiality } for pid=3412 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.159000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc826f3a30 a2=94 a3=88 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.159000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { perfmon } for pid=3412 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.159000 audit[3412]: AVC avc: denied { confidentiality } for pid=3412 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.159000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc826f3a30 a2=94 a3=88 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.159000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.160000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.160000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc826f5460 a2=10 a3=f8f00800 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.160000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.161000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.161000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc826f5300 a2=10 a3=3 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.161000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.161000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc826f52a0 a2=10 a3=3 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.161000 audit[3412]: AVC avc: denied { bpf } for pid=3412 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:04.161000 audit[3412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc826f52a0 a2=10 a3=7 items=0 ppid=3200 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:44:04.169000 audit: BPF prog-id=159 op=UNLOAD May 17 00:44:04.261000 audit[3439]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:04.261000 audit[3439]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffd55bc1a0 a2=0 a3=7fffd55bc18c items=0 ppid=3200 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:04.277000 audit[3438]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:04.277000 audit[3438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcc229cbf0 a2=0 a3=7ffcc229cbdc items=0 ppid=3200 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.277000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:04.280000 audit[3437]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:04.280000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc79fca140 a2=0 a3=7ffc79fca12c items=0 ppid=3200 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:04.282000 audit[3443]: NETFILTER_CFG table=filter:104 family=2 entries=94 op=nft_register_chain pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:04.282000 audit[3443]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffdf3d5a670 a2=0 a3=7ffdf3d5a65c items=0 ppid=3200 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:04.378739 kubelet[1930]: E0517 00:44:04.378675 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:04.424000 audit[3454]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:04.424000 audit[3454]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcf9895820 a2=0 a3=7ffcf989580c items=0 ppid=2028 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:04.428000 audit[3454]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:04.428000 audit[3454]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcf9895820 a2=0 a3=0 items=0 ppid=2028 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:05.142978 env[1190]: time="2025-05-17T00:44:05.140724291Z" level=info msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" May 17 00:44:05.195481 systemd-networkd[1005]: caliace1d103894: Gained IPv6LL May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.221 [INFO][3467] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.221 [INFO][3467] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" iface="eth0" netns="/var/run/netns/cni-be8933a6-d8d7-2607-2dde-c4447200156e" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.221 [INFO][3467] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" iface="eth0" netns="/var/run/netns/cni-be8933a6-d8d7-2607-2dde-c4447200156e" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.222 [INFO][3467] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" iface="eth0" netns="/var/run/netns/cni-be8933a6-d8d7-2607-2dde-c4447200156e" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.222 [INFO][3467] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.222 [INFO][3467] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.275 [INFO][3474] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.275 [INFO][3474] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.275 [INFO][3474] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.284 [WARNING][3474] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.284 [INFO][3474] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.287 [INFO][3474] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:05.293879 env[1190]: 2025-05-17 00:44:05.290 [INFO][3467] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:05.300283 env[1190]: time="2025-05-17T00:44:05.298506341Z" level=info msg="TearDown network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" successfully" May 17 00:44:05.300283 env[1190]: time="2025-05-17T00:44:05.298567431Z" level=info msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" returns successfully" May 17 00:44:05.301073 kubelet[1930]: E0517 00:44:05.299110 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:05.297526 systemd[1]: run-netns-cni\x2dbe8933a6\x2dd8d7\x2d2607\x2d2dde\x2dc4447200156e.mount: Deactivated successfully. May 17 00:44:05.302125 env[1190]: time="2025-05-17T00:44:05.301955146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-mg4ql,Uid:73b60263-1259-4e7b-9da7-c18fb7cb6fd2,Namespace:kube-system,Attempt:1,}" May 17 00:44:05.381323 systemd-networkd[1005]: vxlan.calico: Gained IPv6LL May 17 00:44:05.392868 kubelet[1930]: E0517 00:44:05.392525 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:05.522412 systemd-networkd[1005]: calibc88fe1c829: Link UP May 17 00:44:05.525985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:44:05.526175 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibc88fe1c829: link becomes ready May 17 00:44:05.526692 systemd-networkd[1005]: calibc88fe1c829: Gained carrier May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.390 [INFO][3481] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0 coredns-668d6bf9bc- kube-system 73b60263-1259-4e7b-9da7-c18fb7cb6fd2 922 0 2025-05-17 00:43:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 coredns-668d6bf9bc-mg4ql eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibc88fe1c829 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.393 [INFO][3481] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.449 [INFO][3492] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" HandleID="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.449 [INFO][3492] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" HandleID="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d96f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"coredns-668d6bf9bc-mg4ql", "timestamp":"2025-05-17 00:44:05.449361452 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.449 [INFO][3492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.449 [INFO][3492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.450 [INFO][3492] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.459 [INFO][3492] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.467 [INFO][3492] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.477 [INFO][3492] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.481 [INFO][3492] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.490 [INFO][3492] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.491 [INFO][3492] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.494 [INFO][3492] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9 May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.501 [INFO][3492] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.512 [INFO][3492] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.2/26] block=192.168.35.0/26 handle="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.512 [INFO][3492] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.2/26] handle="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.512 [INFO][3492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:05.555420 env[1190]: 2025-05-17 00:44:05.512 [INFO][3492] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.2/26] IPv6=[] ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" HandleID="k8s-pod-network.6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.515 [INFO][3481] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"73b60263-1259-4e7b-9da7-c18fb7cb6fd2", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"coredns-668d6bf9bc-mg4ql", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc88fe1c829", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.516 [INFO][3481] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.2/32] ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.516 [INFO][3481] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibc88fe1c829 ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.532 [INFO][3481] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.532 [INFO][3481] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"73b60263-1259-4e7b-9da7-c18fb7cb6fd2", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9", Pod:"coredns-668d6bf9bc-mg4ql", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc88fe1c829", MAC:"8e:74:23:97:30:83", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:05.556780 env[1190]: 2025-05-17 00:44:05.551 [INFO][3481] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9" Namespace="kube-system" Pod="coredns-668d6bf9bc-mg4ql" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:05.577686 env[1190]: time="2025-05-17T00:44:05.576691934Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:05.577686 env[1190]: time="2025-05-17T00:44:05.576751754Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:05.577686 env[1190]: time="2025-05-17T00:44:05.576762135Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:05.577686 env[1190]: time="2025-05-17T00:44:05.576932582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9 pid=3515 runtime=io.containerd.runc.v2 May 17 00:44:05.612860 systemd[1]: Started cri-containerd-6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9.scope. May 17 00:44:05.619000 audit[3532]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:05.622644 kernel: kauditd_printk_skb: 611 callbacks suppressed May 17 00:44:05.622784 kernel: audit: type=1325 audit(1747442645.619:1149): table=filter:107 family=2 entries=42 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:05.624342 kernel: audit: type=1300 audit(1747442645.619:1149): arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffc318b26a0 a2=0 a3=7ffc318b268c items=0 ppid=3200 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.619000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffc318b26a0 a2=0 a3=7ffc318b268c items=0 ppid=3200 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:05.630106 kernel: audit: type=1327 audit(1747442645.619:1149): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:05.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.649454 kernel: audit: type=1400 audit(1747442645.643:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.649624 kernel: audit: type=1400 audit(1747442645.643:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.652023 kernel: audit: type=1400 audit(1747442645.643:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.652197 kernel: audit: type=1400 audit(1747442645.643:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.657206 kernel: audit: type=1400 audit(1747442645.643:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.657352 kernel: audit: type=1400 audit(1747442645.643:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.662198 kernel: audit: type=1400 audit(1747442645.643:1156): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.646000 audit: BPF prog-id=165 op=LOAD May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3515 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663656232653837393830336637333535343862626462373464333938 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3515 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663656232653837393830336637333535343862626462373464333938 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.648000 audit: BPF prog-id=166 op=LOAD May 17 00:44:05.648000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000303290 items=0 ppid=3515 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663656232653837393830336637333535343862626462373464333938 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.654000 audit: BPF prog-id=167 op=LOAD May 17 00:44:05.654000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003032d8 items=0 ppid=3515 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663656232653837393830336637333535343862626462373464333938 May 17 00:44:05.659000 audit: BPF prog-id=167 op=UNLOAD May 17 00:44:05.659000 audit: BPF prog-id=166 op=UNLOAD May 17 00:44:05.659000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.659000 audit: BPF prog-id=168 op=LOAD May 17 00:44:05.659000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003036e8 items=0 ppid=3515 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663656232653837393830336637333535343862626462373464333938 May 17 00:44:05.699581 env[1190]: time="2025-05-17T00:44:05.699516463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-mg4ql,Uid:73b60263-1259-4e7b-9da7-c18fb7cb6fd2,Namespace:kube-system,Attempt:1,} returns sandbox id \"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9\"" May 17 00:44:05.701341 kubelet[1930]: E0517 00:44:05.700760 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:05.708976 env[1190]: time="2025-05-17T00:44:05.708365921Z" level=info msg="CreateContainer within sandbox \"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:44:05.723472 env[1190]: time="2025-05-17T00:44:05.723413326Z" level=info msg="CreateContainer within sandbox \"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d27ca15a998c33a916965036a44fe698caa697efc2e29f29b1045b269a02a699\"" May 17 00:44:05.724555 env[1190]: time="2025-05-17T00:44:05.724496390Z" level=info msg="StartContainer for \"d27ca15a998c33a916965036a44fe698caa697efc2e29f29b1045b269a02a699\"" May 17 00:44:05.749633 systemd[1]: Started cri-containerd-d27ca15a998c33a916965036a44fe698caa697efc2e29f29b1045b269a02a699.scope. May 17 00:44:05.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.778000 audit: BPF prog-id=169 op=LOAD May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3515 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376361313561393938633333613931363936353033366134346665 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3515 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376361313561393938633333613931363936353033366134346665 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit: BPF prog-id=170 op=LOAD May 17 00:44:05.779000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000267d40 items=0 ppid=3515 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376361313561393938633333613931363936353033366134346665 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.779000 audit: BPF prog-id=171 op=LOAD May 17 00:44:05.779000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000267d88 items=0 ppid=3515 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376361313561393938633333613931363936353033366134346665 May 17 00:44:05.780000 audit: BPF prog-id=171 op=UNLOAD May 17 00:44:05.780000 audit: BPF prog-id=170 op=UNLOAD May 17 00:44:05.780000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:05.780000 audit: BPF prog-id=172 op=LOAD May 17 00:44:05.780000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b4198 items=0 ppid=3515 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:05.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376361313561393938633333613931363936353033366134346665 May 17 00:44:05.802478 env[1190]: time="2025-05-17T00:44:05.802402523Z" level=info msg="StartContainer for \"d27ca15a998c33a916965036a44fe698caa697efc2e29f29b1045b269a02a699\" returns successfully" May 17 00:44:05.932000 audit[3571]: AVC avc: denied { getattr } for pid=3571 comm="coredns" path="cgroup:[4026532795]" dev="nsfs" ino=4026532795 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c633 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:44:05.932000 audit[3571]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c000444c68 a3=0 items=0 ppid=3515 pid=3571 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c633 key=(null) May 17 00:44:05.932000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:44:06.384650 kubelet[1930]: E0517 00:44:06.384615 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:06.435041 kubelet[1930]: I0517 00:44:06.434956 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-mg4ql" podStartSLOduration=35.434926623 podStartE2EDuration="35.434926623s" podCreationTimestamp="2025-05-17 00:43:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:44:06.409801529 +0000 UTC m=+41.470088332" watchObservedRunningTime="2025-05-17 00:44:06.434926623 +0000 UTC m=+41.495213430" May 17 00:44:06.443000 audit[3590]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:06.443000 audit[3590]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffa77d5710 a2=0 a3=7fffa77d56fc items=0 ppid=2028 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:06.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:06.454000 audit[3590]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:06.454000 audit[3590]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa77d5710 a2=0 a3=0 items=0 ppid=2028 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:06.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:06.480000 audit[3592]: NETFILTER_CFG table=filter:110 family=2 entries=17 op=nft_register_rule pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:06.480000 audit[3592]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe28326cb0 a2=0 a3=7ffe28326c9c items=0 ppid=2028 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:06.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:06.485000 audit[3592]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:06.485000 audit[3592]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe28326cb0 a2=0 a3=7ffe28326c9c items=0 ppid=2028 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:06.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:07.044553 systemd-networkd[1005]: calibc88fe1c829: Gained IPv6LL May 17 00:44:07.142003 env[1190]: time="2025-05-17T00:44:07.140639315Z" level=info msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" May 17 00:44:07.143563 env[1190]: time="2025-05-17T00:44:07.143139121Z" level=info msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.229 [INFO][3614] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.229 [INFO][3614] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" iface="eth0" netns="/var/run/netns/cni-c06b5457-d175-7bcf-a139-09a40ec4568d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.229 [INFO][3614] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" iface="eth0" netns="/var/run/netns/cni-c06b5457-d175-7bcf-a139-09a40ec4568d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.230 [INFO][3614] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" iface="eth0" netns="/var/run/netns/cni-c06b5457-d175-7bcf-a139-09a40ec4568d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.230 [INFO][3614] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.230 [INFO][3614] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.283 [INFO][3626] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.283 [INFO][3626] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.284 [INFO][3626] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.294 [WARNING][3626] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.294 [INFO][3626] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.297 [INFO][3626] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:07.309745 env[1190]: 2025-05-17 00:44:07.300 [INFO][3614] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:07.308856 systemd[1]: run-netns-cni\x2dc06b5457\x2dd175\x2d7bcf\x2da139\x2d09a40ec4568d.mount: Deactivated successfully. May 17 00:44:07.311615 env[1190]: time="2025-05-17T00:44:07.310737935Z" level=info msg="TearDown network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" successfully" May 17 00:44:07.311615 env[1190]: time="2025-05-17T00:44:07.310797051Z" level=info msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" returns successfully" May 17 00:44:07.311831 env[1190]: time="2025-05-17T00:44:07.311779722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-h99gw,Uid:8afe8629-8ece-4e93-aff0-9b5c027ae04a,Namespace:calico-apiserver,Attempt:1,}" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.222 [INFO][3613] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.236 [INFO][3613] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" iface="eth0" netns="/var/run/netns/cni-ea55d488-72a0-001c-4c1e-dff6282e29d4" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.236 [INFO][3613] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" iface="eth0" netns="/var/run/netns/cni-ea55d488-72a0-001c-4c1e-dff6282e29d4" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.237 [INFO][3613] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" iface="eth0" netns="/var/run/netns/cni-ea55d488-72a0-001c-4c1e-dff6282e29d4" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.246 [INFO][3613] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.246 [INFO][3613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.299 [INFO][3632] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.300 [INFO][3632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.300 [INFO][3632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.316 [WARNING][3632] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.316 [INFO][3632] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.319 [INFO][3632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:07.338311 env[1190]: 2025-05-17 00:44:07.322 [INFO][3613] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:07.339531 env[1190]: time="2025-05-17T00:44:07.339470698Z" level=info msg="TearDown network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" successfully" May 17 00:44:07.339744 env[1190]: time="2025-05-17T00:44:07.339711633Z" level=info msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" returns successfully" May 17 00:44:07.341443 env[1190]: time="2025-05-17T00:44:07.341391576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5dcv,Uid:4012fc42-c091-49aa-9549-82c50f8e5fa6,Namespace:calico-system,Attempt:1,}" May 17 00:44:07.349864 systemd[1]: run-netns-cni\x2dea55d488\x2d72a0\x2d001c\x2d4c1e\x2ddff6282e29d4.mount: Deactivated successfully. May 17 00:44:07.387457 kubelet[1930]: E0517 00:44:07.387330 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:07.569654 systemd-networkd[1005]: cali0fabdbe02ec: Link UP May 17 00:44:07.578235 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:44:07.578530 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0fabdbe02ec: link becomes ready May 17 00:44:07.577756 systemd-networkd[1005]: cali0fabdbe02ec: Gained carrier May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.447 [INFO][3649] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0 csi-node-driver- calico-system 4012fc42-c091-49aa-9549-82c50f8e5fa6 951 0 2025-05-17 00:43:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 csi-node-driver-f5dcv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0fabdbe02ec [] [] }} ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.447 [INFO][3649] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.496 [INFO][3670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" HandleID="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.496 [INFO][3670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" HandleID="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"csi-node-driver-f5dcv", "timestamp":"2025-05-17 00:44:07.496309151 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.496 [INFO][3670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.496 [INFO][3670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.496 [INFO][3670] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.516 [INFO][3670] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.525 [INFO][3670] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.533 [INFO][3670] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.537 [INFO][3670] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.541 [INFO][3670] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.541 [INFO][3670] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.544 [INFO][3670] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.551 [INFO][3670] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.559 [INFO][3670] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.3/26] block=192.168.35.0/26 handle="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.559 [INFO][3670] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.3/26] handle="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.560 [INFO][3670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:07.611047 env[1190]: 2025-05-17 00:44:07.562 [INFO][3670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.3/26] IPv6=[] ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" HandleID="k8s-pod-network.4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.565 [INFO][3649] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4012fc42-c091-49aa-9549-82c50f8e5fa6", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"csi-node-driver-f5dcv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0fabdbe02ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.565 [INFO][3649] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.3/32] ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.565 [INFO][3649] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0fabdbe02ec ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.586 [INFO][3649] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.587 [INFO][3649] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4012fc42-c091-49aa-9549-82c50f8e5fa6", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a", Pod:"csi-node-driver-f5dcv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0fabdbe02ec", MAC:"be:e7:1f:32:5b:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:07.612593 env[1190]: 2025-05-17 00:44:07.607 [INFO][3649] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a" Namespace="calico-system" Pod="csi-node-driver-f5dcv" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:07.640663 env[1190]: time="2025-05-17T00:44:07.640385941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:07.640663 env[1190]: time="2025-05-17T00:44:07.640445846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:07.640663 env[1190]: time="2025-05-17T00:44:07.640456641Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:07.640949 env[1190]: time="2025-05-17T00:44:07.640736453Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a pid=3694 runtime=io.containerd.runc.v2 May 17 00:44:07.657214 systemd[1]: Started cri-containerd-4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a.scope. May 17 00:44:07.694699 systemd-networkd[1005]: cali196fd8c46d1: Link UP May 17 00:44:07.694940 systemd-networkd[1005]: cali196fd8c46d1: Gained carrier May 17 00:44:07.695479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali196fd8c46d1: link becomes ready May 17 00:44:07.699000 audit[3716]: NETFILTER_CFG table=filter:112 family=2 entries=40 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:07.699000 audit[3716]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7ffcddfe86d0 a2=0 a3=7ffcddfe86bc items=0 ppid=3200 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.434 [INFO][3640] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0 calico-apiserver-65f5b4d999- calico-apiserver 8afe8629-8ece-4e93-aff0-9b5c027ae04a 952 0 2025-05-17 00:43:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65f5b4d999 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 calico-apiserver-65f5b4d999-h99gw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali196fd8c46d1 [] [] }} ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.435 [INFO][3640] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.499 [INFO][3665] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" HandleID="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.500 [INFO][3665] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" HandleID="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d96f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"calico-apiserver-65f5b4d999-h99gw", "timestamp":"2025-05-17 00:44:07.499793857 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.500 [INFO][3665] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.559 [INFO][3665] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.559 [INFO][3665] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.620 [INFO][3665] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.629 [INFO][3665] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.638 [INFO][3665] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.655 [INFO][3665] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.664 [INFO][3665] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.664 [INFO][3665] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.666 [INFO][3665] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2 May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.672 [INFO][3665] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.682 [INFO][3665] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.4/26] block=192.168.35.0/26 handle="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.682 [INFO][3665] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.4/26] handle="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.682 [INFO][3665] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:07.714435 env[1190]: 2025-05-17 00:44:07.682 [INFO][3665] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.4/26] IPv6=[] ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" HandleID="k8s-pod-network.b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.686 [INFO][3640] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"8afe8629-8ece-4e93-aff0-9b5c027ae04a", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"calico-apiserver-65f5b4d999-h99gw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali196fd8c46d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.686 [INFO][3640] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.4/32] ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.686 [INFO][3640] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali196fd8c46d1 ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.697 [INFO][3640] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.697 [INFO][3640] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"8afe8629-8ece-4e93-aff0-9b5c027ae04a", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2", Pod:"calico-apiserver-65f5b4d999-h99gw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali196fd8c46d1", MAC:"ce:02:ea:4f:d3:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:07.715194 env[1190]: 2025-05-17 00:44:07.711 [INFO][3640] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-h99gw" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:07.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.717000 audit: BPF prog-id=173 op=LOAD May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3694 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461363936316131386137363436306562623662333239356361636235 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3694 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461363936316131386137363436306562623662333239356361636235 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit: BPF prog-id=174 op=LOAD May 17 00:44:07.719000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003b1090 items=0 ppid=3694 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461363936316131386137363436306562623662333239356361636235 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit: BPF prog-id=175 op=LOAD May 17 00:44:07.719000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003b10d8 items=0 ppid=3694 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461363936316131386137363436306562623662333239356361636235 May 17 00:44:07.719000 audit: BPF prog-id=175 op=UNLOAD May 17 00:44:07.719000 audit: BPF prog-id=174 op=UNLOAD May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.719000 audit: BPF prog-id=176 op=LOAD May 17 00:44:07.719000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b14e8 items=0 ppid=3694 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461363936316131386137363436306562623662333239356361636235 May 17 00:44:07.742714 env[1190]: time="2025-05-17T00:44:07.742531067Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:07.742714 env[1190]: time="2025-05-17T00:44:07.742662953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:07.742943 env[1190]: time="2025-05-17T00:44:07.742824364Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:07.743808 env[1190]: time="2025-05-17T00:44:07.743758136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5dcv,Uid:4012fc42-c091-49aa-9549-82c50f8e5fa6,Namespace:calico-system,Attempt:1,} returns sandbox id \"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a\"" May 17 00:44:07.745270 env[1190]: time="2025-05-17T00:44:07.744213919Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2 pid=3736 runtime=io.containerd.runc.v2 May 17 00:44:07.748062 env[1190]: time="2025-05-17T00:44:07.748009296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:44:07.756000 audit[3754]: NETFILTER_CFG table=filter:113 family=2 entries=58 op=nft_register_chain pid=3754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:07.756000 audit[3754]: SYSCALL arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffe4576d880 a2=0 a3=7ffe4576d86c items=0 ppid=3200 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.756000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:07.770493 systemd[1]: Started cri-containerd-b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2.scope. May 17 00:44:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.791000 audit: BPF prog-id=177 op=LOAD May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3736 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663465633837333665356466373663376537636332343036633739 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3736 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663465633837333665356466373663376537636332343036633739 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit: BPF prog-id=178 op=LOAD May 17 00:44:07.793000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000222a10 items=0 ppid=3736 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663465633837333665356466373663376537636332343036633739 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.793000 audit: BPF prog-id=179 op=LOAD May 17 00:44:07.793000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000222a58 items=0 ppid=3736 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663465633837333665356466373663376537636332343036633739 May 17 00:44:07.793000 audit: BPF prog-id=179 op=UNLOAD May 17 00:44:07.794000 audit: BPF prog-id=178 op=UNLOAD May 17 00:44:07.794000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:07.794000 audit: BPF prog-id=180 op=LOAD May 17 00:44:07.794000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000222e68 items=0 ppid=3736 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663465633837333665356466373663376537636332343036633739 May 17 00:44:07.845407 env[1190]: time="2025-05-17T00:44:07.841508796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-h99gw,Uid:8afe8629-8ece-4e93-aff0-9b5c027ae04a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2\"" May 17 00:44:08.139309 env[1190]: time="2025-05-17T00:44:08.139125909Z" level=info msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.220 [INFO][3786] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.220 [INFO][3786] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" iface="eth0" netns="/var/run/netns/cni-59d08d48-761c-b25c-cf3b-aba46db4d505" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.221 [INFO][3786] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" iface="eth0" netns="/var/run/netns/cni-59d08d48-761c-b25c-cf3b-aba46db4d505" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.221 [INFO][3786] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" iface="eth0" netns="/var/run/netns/cni-59d08d48-761c-b25c-cf3b-aba46db4d505" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.221 [INFO][3786] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.221 [INFO][3786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.259 [INFO][3793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.259 [INFO][3793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.259 [INFO][3793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.267 [WARNING][3793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.267 [INFO][3793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.269 [INFO][3793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:08.275833 env[1190]: 2025-05-17 00:44:08.273 [INFO][3786] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:08.276903 env[1190]: time="2025-05-17T00:44:08.276007496Z" level=info msg="TearDown network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" successfully" May 17 00:44:08.276903 env[1190]: time="2025-05-17T00:44:08.276042687Z" level=info msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" returns successfully" May 17 00:44:08.277117 kubelet[1930]: E0517 00:44:08.276624 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:08.278850 env[1190]: time="2025-05-17T00:44:08.278801573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hhhm4,Uid:d0ccdba1-af4b-4719-bc28-bd16d9c3505b,Namespace:kube-system,Attempt:1,}" May 17 00:44:08.313604 systemd[1]: run-netns-cni\x2d59d08d48\x2d761c\x2db25c\x2dcf3b\x2daba46db4d505.mount: Deactivated successfully. May 17 00:44:08.395850 kubelet[1930]: E0517 00:44:08.395131 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:08.451126 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib14e2ecdb4e: link becomes ready May 17 00:44:08.445562 systemd-networkd[1005]: calib14e2ecdb4e: Link UP May 17 00:44:08.445953 systemd-networkd[1005]: calib14e2ecdb4e: Gained carrier May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.339 [INFO][3799] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0 coredns-668d6bf9bc- kube-system d0ccdba1-af4b-4719-bc28-bd16d9c3505b 965 0 2025-05-17 00:43:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 coredns-668d6bf9bc-hhhm4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib14e2ecdb4e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.340 [INFO][3799] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.372 [INFO][3812] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" HandleID="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.373 [INFO][3812] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" HandleID="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235260), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"coredns-668d6bf9bc-hhhm4", "timestamp":"2025-05-17 00:44:08.372891108 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.373 [INFO][3812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.373 [INFO][3812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.373 [INFO][3812] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.382 [INFO][3812] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.396 [INFO][3812] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.406 [INFO][3812] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.409 [INFO][3812] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.412 [INFO][3812] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.412 [INFO][3812] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.414 [INFO][3812] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.423 [INFO][3812] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.435 [INFO][3812] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.5/26] block=192.168.35.0/26 handle="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.435 [INFO][3812] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.5/26] handle="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.435 [INFO][3812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:08.464183 env[1190]: 2025-05-17 00:44:08.435 [INFO][3812] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.5/26] IPv6=[] ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" HandleID="k8s-pod-network.698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.438 [INFO][3799] cni-plugin/k8s.go 418: Populated endpoint ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d0ccdba1-af4b-4719-bc28-bd16d9c3505b", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"coredns-668d6bf9bc-hhhm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib14e2ecdb4e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.438 [INFO][3799] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.5/32] ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.438 [INFO][3799] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib14e2ecdb4e ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.442 [INFO][3799] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.443 [INFO][3799] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d0ccdba1-af4b-4719-bc28-bd16d9c3505b", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d", Pod:"coredns-668d6bf9bc-hhhm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib14e2ecdb4e", MAC:"32:06:93:d8:ad:e4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:08.464963 env[1190]: 2025-05-17 00:44:08.460 [INFO][3799] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d" Namespace="kube-system" Pod="coredns-668d6bf9bc-hhhm4" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:08.480334 env[1190]: time="2025-05-17T00:44:08.478618565Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:08.480334 env[1190]: time="2025-05-17T00:44:08.478723375Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:08.480334 env[1190]: time="2025-05-17T00:44:08.478750934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:08.480334 env[1190]: time="2025-05-17T00:44:08.478941422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d pid=3835 runtime=io.containerd.runc.v2 May 17 00:44:08.483000 audit[3844]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:08.483000 audit[3844]: SYSCALL arch=c000003e syscall=46 success=yes exit=24384 a0=3 a1=7fffabf9fd10 a2=0 a3=7fffabf9fcfc items=0 ppid=3200 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.483000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:08.512211 systemd[1]: run-containerd-runc-k8s.io-698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d-runc.xI4mU7.mount: Deactivated successfully. May 17 00:44:08.515725 systemd[1]: Started cri-containerd-698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d.scope. May 17 00:44:08.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.533000 audit: BPF prog-id=181 op=LOAD May 17 00:44:08.534000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.534000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386164396366313838343133386431616536366562643961633830 May 17 00:44:08.534000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.534000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386164396366313838343133386431616536366562643961633830 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.535000 audit: BPF prog-id=182 op=LOAD May 17 00:44:08.535000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000323070 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386164396366313838343133386431616536366562643961633830 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit: BPF prog-id=183 op=LOAD May 17 00:44:08.536000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003230b8 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386164396366313838343133386431616536366562643961633830 May 17 00:44:08.536000 audit: BPF prog-id=183 op=UNLOAD May 17 00:44:08.536000 audit: BPF prog-id=182 op=UNLOAD May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.536000 audit: BPF prog-id=184 op=LOAD May 17 00:44:08.536000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003234c8 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386164396366313838343133386431616536366562643961633830 May 17 00:44:08.576259 env[1190]: time="2025-05-17T00:44:08.576216388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hhhm4,Uid:d0ccdba1-af4b-4719-bc28-bd16d9c3505b,Namespace:kube-system,Attempt:1,} returns sandbox id \"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d\"" May 17 00:44:08.578088 kubelet[1930]: E0517 00:44:08.577467 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:08.582255 env[1190]: time="2025-05-17T00:44:08.582197889Z" level=info msg="CreateContainer within sandbox \"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:44:08.607591 env[1190]: time="2025-05-17T00:44:08.607539954Z" level=info msg="CreateContainer within sandbox \"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f783c96fd60fddf1cb8583c3a0b00a37c38e77abb35f0af3bc555748cabebf7b\"" May 17 00:44:08.610667 env[1190]: time="2025-05-17T00:44:08.610615208Z" level=info msg="StartContainer for \"f783c96fd60fddf1cb8583c3a0b00a37c38e77abb35f0af3bc555748cabebf7b\"" May 17 00:44:08.632616 systemd[1]: Started cri-containerd-f783c96fd60fddf1cb8583c3a0b00a37c38e77abb35f0af3bc555748cabebf7b.scope. May 17 00:44:08.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.652000 audit: BPF prog-id=185 op=LOAD May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3835 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637383363393666643630666464663163623835383363336130623030 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3835 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637383363393666643630666464663163623835383363336130623030 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit: BPF prog-id=186 op=LOAD May 17 00:44:08.653000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002bb530 items=0 ppid=3835 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637383363393666643630666464663163623835383363336130623030 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit: BPF prog-id=187 op=LOAD May 17 00:44:08.653000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002bb578 items=0 ppid=3835 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637383363393666643630666464663163623835383363336130623030 May 17 00:44:08.653000 audit: BPF prog-id=187 op=UNLOAD May 17 00:44:08.653000 audit: BPF prog-id=186 op=UNLOAD May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:08.653000 audit: BPF prog-id=188 op=LOAD May 17 00:44:08.653000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002bb988 items=0 ppid=3835 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637383363393666643630666464663163623835383363336130623030 May 17 00:44:08.678468 env[1190]: time="2025-05-17T00:44:08.678386714Z" level=info msg="StartContainer for \"f783c96fd60fddf1cb8583c3a0b00a37c38e77abb35f0af3bc555748cabebf7b\" returns successfully" May 17 00:44:08.722000 audit[3890]: AVC avc: denied { getattr } for pid=3890 comm="coredns" path="cgroup:[4026532453]" dev="nsfs" ino=4026532453 scontext=system_u:system_r:svirt_lxc_net_t:s0:c453,c872 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:44:08.722000 audit[3890]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c900 a2=c00049d558 a3=0 items=0 ppid=3835 pid=3890 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c453,c872 key=(null) May 17 00:44:08.722000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:44:08.771616 systemd-networkd[1005]: cali0fabdbe02ec: Gained IPv6LL May 17 00:44:09.061521 env[1190]: time="2025-05-17T00:44:09.061439712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:09.063268 env[1190]: time="2025-05-17T00:44:09.063213202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:09.065019 env[1190]: time="2025-05-17T00:44:09.064972665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:09.066678 env[1190]: time="2025-05-17T00:44:09.066637284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:09.067236 env[1190]: time="2025-05-17T00:44:09.067194100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:44:09.069254 env[1190]: time="2025-05-17T00:44:09.069222975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:44:09.071914 env[1190]: time="2025-05-17T00:44:09.071562478Z" level=info msg="CreateContainer within sandbox \"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:44:09.100067 env[1190]: time="2025-05-17T00:44:09.100006899Z" level=info msg="CreateContainer within sandbox \"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bffdd083ce1711c296900d06933544a5d05a0074a3d7a4e6a2bd9d107ca1ee5c\"" May 17 00:44:09.101947 env[1190]: time="2025-05-17T00:44:09.101529182Z" level=info msg="StartContainer for \"bffdd083ce1711c296900d06933544a5d05a0074a3d7a4e6a2bd9d107ca1ee5c\"" May 17 00:44:09.131515 systemd[1]: Started cri-containerd-bffdd083ce1711c296900d06933544a5d05a0074a3d7a4e6a2bd9d107ca1ee5c.scope. May 17 00:44:09.145034 env[1190]: time="2025-05-17T00:44:09.144990186Z" level=info msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" May 17 00:44:09.146200 env[1190]: time="2025-05-17T00:44:09.146126692Z" level=info msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" May 17 00:44:09.155596 systemd-networkd[1005]: cali196fd8c46d1: Gained IPv6LL May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f537c95f518 items=0 ppid=3694 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266666464303833636531373131633239363930306430363933333534 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit: BPF prog-id=189 op=LOAD May 17 00:44:09.179000 audit[3918]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9a28 items=0 ppid=3694 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266666464303833636531373131633239363930306430363933333534 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit: BPF prog-id=190 op=LOAD May 17 00:44:09.179000 audit[3918]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9a78 items=0 ppid=3694 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266666464303833636531373131633239363930306430363933333534 May 17 00:44:09.179000 audit: BPF prog-id=190 op=UNLOAD May 17 00:44:09.179000 audit: BPF prog-id=189 op=UNLOAD May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { perfmon } for pid=3918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit[3918]: AVC avc: denied { bpf } for pid=3918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.179000 audit: BPF prog-id=191 op=LOAD May 17 00:44:09.179000 audit[3918]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9b08 items=0 ppid=3694 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266666464303833636531373131633239363930306430363933333534 May 17 00:44:09.226739 env[1190]: time="2025-05-17T00:44:09.226684420Z" level=info msg="StartContainer for \"bffdd083ce1711c296900d06933544a5d05a0074a3d7a4e6a2bd9d107ca1ee5c\" returns successfully" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.322 [INFO][3954] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.322 [INFO][3954] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" iface="eth0" netns="/var/run/netns/cni-fb7377ce-0460-aefd-b32d-2f5c14aed822" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.324 [INFO][3954] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" iface="eth0" netns="/var/run/netns/cni-fb7377ce-0460-aefd-b32d-2f5c14aed822" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.326 [INFO][3954] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" iface="eth0" netns="/var/run/netns/cni-fb7377ce-0460-aefd-b32d-2f5c14aed822" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.326 [INFO][3954] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.326 [INFO][3954] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.364 [INFO][3987] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.364 [INFO][3987] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.364 [INFO][3987] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.373 [WARNING][3987] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.373 [INFO][3987] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.376 [INFO][3987] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:09.391473 env[1190]: 2025-05-17 00:44:09.380 [INFO][3954] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:09.391605 systemd[1]: run-netns-cni\x2dfb7377ce\x2d0460\x2daefd\x2db32d\x2d2f5c14aed822.mount: Deactivated successfully. May 17 00:44:09.393518 env[1190]: time="2025-05-17T00:44:09.393467032Z" level=info msg="TearDown network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" successfully" May 17 00:44:09.393518 env[1190]: time="2025-05-17T00:44:09.393515939Z" level=info msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" returns successfully" May 17 00:44:09.396016 env[1190]: time="2025-05-17T00:44:09.395952869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6984db5bf8-ssqjf,Uid:c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1,Namespace:calico-system,Attempt:1,}" May 17 00:44:09.410416 kubelet[1930]: E0517 00:44:09.409632 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:09.476144 kubelet[1930]: I0517 00:44:09.475398 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-hhhm4" podStartSLOduration=38.475239153 podStartE2EDuration="38.475239153s" podCreationTimestamp="2025-05-17 00:43:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:44:09.444900405 +0000 UTC m=+44.505187213" watchObservedRunningTime="2025-05-17 00:44:09.475239153 +0000 UTC m=+44.535525970" May 17 00:44:09.491000 audit[4008]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=4008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:09.491000 audit[4008]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe115c8db0 a2=0 a3=7ffe115c8d9c items=0 ppid=2028 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:09.498000 audit[4008]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:09.498000 audit[4008]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe115c8db0 a2=0 a3=7ffe115c8d9c items=0 ppid=2028 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.294 [INFO][3953] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.295 [INFO][3953] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" iface="eth0" netns="/var/run/netns/cni-de22342d-40d8-6cbd-f944-c86b71a8ba92" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.298 [INFO][3953] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" iface="eth0" netns="/var/run/netns/cni-de22342d-40d8-6cbd-f944-c86b71a8ba92" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.300 [INFO][3953] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" iface="eth0" netns="/var/run/netns/cni-de22342d-40d8-6cbd-f944-c86b71a8ba92" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.300 [INFO][3953] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.300 [INFO][3953] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.460 [INFO][3981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.466 [INFO][3981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.466 [INFO][3981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.496 [WARNING][3981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.497 [INFO][3981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.503 [INFO][3981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:09.510105 env[1190]: 2025-05-17 00:44:09.506 [INFO][3953] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:09.517878 env[1190]: time="2025-05-17T00:44:09.513728360Z" level=info msg="TearDown network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" successfully" May 17 00:44:09.517878 env[1190]: time="2025-05-17T00:44:09.513774856Z" level=info msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" returns successfully" May 17 00:44:09.512939 systemd[1]: run-netns-cni\x2dde22342d\x2d40d8\x2d6cbd\x2df944\x2dc86b71a8ba92.mount: Deactivated successfully. May 17 00:44:09.520551 env[1190]: time="2025-05-17T00:44:09.520486129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-8lqmt,Uid:edfc8f67-761b-4428-b703-bd8f02b95a90,Namespace:calico-apiserver,Attempt:1,}" May 17 00:44:09.542000 audit[4010]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:09.542000 audit[4010]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff4a710fa0 a2=0 a3=7fff4a710f8c items=0 ppid=2028 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:09.556000 audit[4010]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:09.556000 audit[4010]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff4a710fa0 a2=0 a3=7fff4a710f8c items=0 ppid=2028 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:09.667676 systemd-networkd[1005]: calib14e2ecdb4e: Gained IPv6LL May 17 00:44:09.727820 systemd-networkd[1005]: cali3d042b0cbbe: Link UP May 17 00:44:09.734500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:44:09.734683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d042b0cbbe: link becomes ready May 17 00:44:09.734883 systemd-networkd[1005]: cali3d042b0cbbe: Gained carrier May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.590 [INFO][3997] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0 calico-kube-controllers-6984db5bf8- calico-system c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1 985 0 2025-05-17 00:43:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6984db5bf8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 calico-kube-controllers-6984db5bf8-ssqjf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3d042b0cbbe [] [] }} ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.591 [INFO][3997] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.664 [INFO][4024] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" HandleID="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.664 [INFO][4024] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" HandleID="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"calico-kube-controllers-6984db5bf8-ssqjf", "timestamp":"2025-05-17 00:44:09.664334897 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.664 [INFO][4024] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.665 [INFO][4024] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.665 [INFO][4024] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.675 [INFO][4024] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.682 [INFO][4024] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.688 [INFO][4024] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.691 [INFO][4024] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.697 [INFO][4024] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.698 [INFO][4024] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.700 [INFO][4024] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57 May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.707 [INFO][4024] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.716 [INFO][4024] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.6/26] block=192.168.35.0/26 handle="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.716 [INFO][4024] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.6/26] handle="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.716 [INFO][4024] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:09.764587 env[1190]: 2025-05-17 00:44:09.716 [INFO][4024] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.6/26] IPv6=[] ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" HandleID="k8s-pod-network.144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.721 [INFO][3997] cni-plugin/k8s.go 418: Populated endpoint ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0", GenerateName:"calico-kube-controllers-6984db5bf8-", Namespace:"calico-system", SelfLink:"", UID:"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6984db5bf8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"calico-kube-controllers-6984db5bf8-ssqjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3d042b0cbbe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.721 [INFO][3997] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.6/32] ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.721 [INFO][3997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3d042b0cbbe ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.745 [INFO][3997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.747 [INFO][3997] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0", GenerateName:"calico-kube-controllers-6984db5bf8-", Namespace:"calico-system", SelfLink:"", UID:"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6984db5bf8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57", Pod:"calico-kube-controllers-6984db5bf8-ssqjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3d042b0cbbe", MAC:"52:7d:03:a8:cd:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:09.765770 env[1190]: 2025-05-17 00:44:09.761 [INFO][3997] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57" Namespace="calico-system" Pod="calico-kube-controllers-6984db5bf8-ssqjf" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:09.786344 env[1190]: time="2025-05-17T00:44:09.785677925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:09.786344 env[1190]: time="2025-05-17T00:44:09.785828538Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:09.786344 env[1190]: time="2025-05-17T00:44:09.785886564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:09.788015 env[1190]: time="2025-05-17T00:44:09.787456622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57 pid=4056 runtime=io.containerd.runc.v2 May 17 00:44:09.796000 audit[4068]: NETFILTER_CFG table=filter:119 family=2 entries=48 op=nft_register_chain pid=4068 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:09.796000 audit[4068]: SYSCALL arch=c000003e syscall=46 success=yes exit=23124 a0=3 a1=7ffc7d82e040 a2=0 a3=7ffc7d82e02c items=0 ppid=3200 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.796000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:09.834754 systemd-networkd[1005]: cali5bad7d3eeee: Link UP May 17 00:44:09.835019 systemd[1]: Started cri-containerd-144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57.scope. May 17 00:44:09.838809 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5bad7d3eeee: link becomes ready May 17 00:44:09.838564 systemd-networkd[1005]: cali5bad7d3eeee: Gained carrier May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.639 [INFO][4011] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0 calico-apiserver-65f5b4d999- calico-apiserver edfc8f67-761b-4428-b703-bd8f02b95a90 984 0 2025-05-17 00:43:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65f5b4d999 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 calico-apiserver-65f5b4d999-8lqmt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5bad7d3eeee [] [] }} ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.639 [INFO][4011] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.718 [INFO][4031] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" HandleID="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.719 [INFO][4031] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" HandleID="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"calico-apiserver-65f5b4d999-8lqmt", "timestamp":"2025-05-17 00:44:09.718915663 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.719 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.719 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.719 [INFO][4031] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.777 [INFO][4031] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.784 [INFO][4031] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.792 [INFO][4031] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.796 [INFO][4031] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.799 [INFO][4031] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.799 [INFO][4031] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.801 [INFO][4031] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091 May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.808 [INFO][4031] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.823 [INFO][4031] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.7/26] block=192.168.35.0/26 handle="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.823 [INFO][4031] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.7/26] handle="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.823 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:09.863446 env[1190]: 2025-05-17 00:44:09.824 [INFO][4031] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.7/26] IPv6=[] ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" HandleID="k8s-pod-network.b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.827 [INFO][4011] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"edfc8f67-761b-4428-b703-bd8f02b95a90", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"calico-apiserver-65f5b4d999-8lqmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bad7d3eeee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.828 [INFO][4011] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.7/32] ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.828 [INFO][4011] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5bad7d3eeee ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.840 [INFO][4011] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.841 [INFO][4011] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"edfc8f67-761b-4428-b703-bd8f02b95a90", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091", Pod:"calico-apiserver-65f5b4d999-8lqmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bad7d3eeee", MAC:"76:7c:bf:75:cf:0c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:09.864203 env[1190]: 2025-05-17 00:44:09.855 [INFO][4011] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091" Namespace="calico-apiserver" Pod="calico-apiserver-65f5b4d999-8lqmt" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:09.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.877000 audit: BPF prog-id=192 op=LOAD May 17 00:44:09.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.877000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4056 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343537306263366239313830386463643537653738616632356163 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4056 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343537306263366239313830386463643537653738616632356163 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit: BPF prog-id=193 op=LOAD May 17 00:44:09.878000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00024c0d0 items=0 ppid=4056 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343537306263366239313830386463643537653738616632356163 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit: BPF prog-id=194 op=LOAD May 17 00:44:09.878000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00024c118 items=0 ppid=4056 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343537306263366239313830386463643537653738616632356163 May 17 00:44:09.878000 audit: BPF prog-id=194 op=UNLOAD May 17 00:44:09.878000 audit: BPF prog-id=193 op=UNLOAD May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.878000 audit: BPF prog-id=195 op=LOAD May 17 00:44:09.878000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00024c528 items=0 ppid=4056 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343537306263366239313830386463643537653738616632356163 May 17 00:44:09.890819 env[1190]: time="2025-05-17T00:44:09.890725050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:09.891120 env[1190]: time="2025-05-17T00:44:09.891074828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:09.891321 env[1190]: time="2025-05-17T00:44:09.891275860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:09.892766 env[1190]: time="2025-05-17T00:44:09.892662290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091 pid=4101 runtime=io.containerd.runc.v2 May 17 00:44:09.921039 systemd[1]: Started cri-containerd-b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091.scope. May 17 00:44:09.931000 audit[4117]: NETFILTER_CFG table=filter:120 family=2 entries=53 op=nft_register_chain pid=4117 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:09.931000 audit[4117]: SYSCALL arch=c000003e syscall=46 success=yes exit=26624 a0=3 a1=7ffdb576e380 a2=0 a3=7ffdb576e36c items=0 ppid=3200 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:09.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.951000 audit: BPF prog-id=196 op=LOAD May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4101 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633862306439343339633536313336303431613563343164646137 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4101 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633862306439343339633536313336303431613563343164646137 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.952000 audit: BPF prog-id=197 op=LOAD May 17 00:44:09.952000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00027de90 items=0 ppid=4101 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633862306439343339633536313336303431613563343164646137 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.953000 audit: BPF prog-id=198 op=LOAD May 17 00:44:09.953000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00027ded8 items=0 ppid=4101 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633862306439343339633536313336303431613563343164646137 May 17 00:44:09.954000 audit: BPF prog-id=198 op=UNLOAD May 17 00:44:09.954000 audit: BPF prog-id=197 op=UNLOAD May 17 00:44:09.954000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:09.954000 audit: BPF prog-id=199 op=LOAD May 17 00:44:09.954000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003ee2e8 items=0 ppid=4101 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633862306439343339633536313336303431613563343164646137 May 17 00:44:09.980445 env[1190]: time="2025-05-17T00:44:09.980398707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6984db5bf8-ssqjf,Uid:c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1,Namespace:calico-system,Attempt:1,} returns sandbox id \"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57\"" May 17 00:44:10.006813 env[1190]: time="2025-05-17T00:44:10.006751416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f5b4d999-8lqmt,Uid:edfc8f67-761b-4428-b703-bd8f02b95a90,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091\"" May 17 00:44:10.139302 env[1190]: time="2025-05-17T00:44:10.139221210Z" level=info msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.221 [INFO][4151] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.221 [INFO][4151] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" iface="eth0" netns="/var/run/netns/cni-8d9261b2-4382-96ad-ab18-6073163fda6c" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.222 [INFO][4151] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" iface="eth0" netns="/var/run/netns/cni-8d9261b2-4382-96ad-ab18-6073163fda6c" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.222 [INFO][4151] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" iface="eth0" netns="/var/run/netns/cni-8d9261b2-4382-96ad-ab18-6073163fda6c" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.222 [INFO][4151] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.222 [INFO][4151] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.287 [INFO][4158] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.291 [INFO][4158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.292 [INFO][4158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.300 [WARNING][4158] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.300 [INFO][4158] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.302 [INFO][4158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:10.323346 env[1190]: 2025-05-17 00:44:10.305 [INFO][4151] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:10.324092 env[1190]: time="2025-05-17T00:44:10.323488237Z" level=info msg="TearDown network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" successfully" May 17 00:44:10.324092 env[1190]: time="2025-05-17T00:44:10.323878868Z" level=info msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" returns successfully" May 17 00:44:10.325178 systemd[1]: run-netns-cni\x2d8d9261b2\x2d4382\x2d96ad\x2dab18\x2d6073163fda6c.mount: Deactivated successfully. May 17 00:44:10.327541 env[1190]: time="2025-05-17T00:44:10.327500355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-f6rvs,Uid:e451f6f0-3693-459e-a9c7-dc41b8be0c59,Namespace:calico-system,Attempt:1,}" May 17 00:44:10.423904 kubelet[1930]: E0517 00:44:10.423861 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:10.558070 systemd-networkd[1005]: cali9e2c106b2ec: Link UP May 17 00:44:10.561337 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9e2c106b2ec: link becomes ready May 17 00:44:10.561542 systemd-networkd[1005]: cali9e2c106b2ec: Gained carrier May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.431 [INFO][4164] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0 goldmane-78d55f7ddc- calico-system e451f6f0-3693-459e-a9c7-dc41b8be0c59 1006 0 2025-05-17 00:43:43 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-f9c20123e0 goldmane-78d55f7ddc-f6rvs eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali9e2c106b2ec [] [] }} ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.431 [INFO][4164] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.484 [INFO][4179] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" HandleID="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.484 [INFO][4179] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" HandleID="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-f9c20123e0", "pod":"goldmane-78d55f7ddc-f6rvs", "timestamp":"2025-05-17 00:44:10.484327107 +0000 UTC"}, Hostname:"ci-3510.3.7-n-f9c20123e0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.484 [INFO][4179] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.484 [INFO][4179] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.484 [INFO][4179] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-f9c20123e0' May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.493 [INFO][4179] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.503 [INFO][4179] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.511 [INFO][4179] ipam/ipam.go 511: Trying affinity for 192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.515 [INFO][4179] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.518 [INFO][4179] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.0/26 host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.518 [INFO][4179] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.0/26 handle="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.521 [INFO][4179] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.529 [INFO][4179] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.0/26 handle="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.540 [INFO][4179] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.8/26] block=192.168.35.0/26 handle="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.540 [INFO][4179] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.8/26] handle="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" host="ci-3510.3.7-n-f9c20123e0" May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.540 [INFO][4179] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:10.591535 env[1190]: 2025-05-17 00:44:10.540 [INFO][4179] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.8/26] IPv6=[] ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" HandleID="k8s-pod-network.5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.545 [INFO][4164] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"e451f6f0-3693-459e-a9c7-dc41b8be0c59", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"", Pod:"goldmane-78d55f7ddc-f6rvs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.35.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali9e2c106b2ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.545 [INFO][4164] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.8/32] ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.545 [INFO][4164] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9e2c106b2ec ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.562 [INFO][4164] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.567 [INFO][4164] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"e451f6f0-3693-459e-a9c7-dc41b8be0c59", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc", Pod:"goldmane-78d55f7ddc-f6rvs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.35.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali9e2c106b2ec", MAC:"8e:aa:3c:ce:d9:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:10.599699 env[1190]: 2025-05-17 00:44:10.585 [INFO][4164] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc" Namespace="calico-system" Pod="goldmane-78d55f7ddc-f6rvs" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:10.630841 kernel: kauditd_printk_skb: 537 callbacks suppressed May 17 00:44:10.630994 kernel: audit: type=1325 audit(1747442650.624:1315): table=filter:121 family=2 entries=64 op=nft_register_chain pid=4198 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:10.624000 audit[4198]: NETFILTER_CFG table=filter:121 family=2 entries=64 op=nft_register_chain pid=4198 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:10.624000 audit[4198]: SYSCALL arch=c000003e syscall=46 success=yes exit=31104 a0=3 a1=7ffdcffe1b10 a2=0 a3=7ffdcffe1afc items=0 ppid=3200 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.651418 kernel: audit: type=1300 audit(1747442650.624:1315): arch=c000003e syscall=46 success=yes exit=31104 a0=3 a1=7ffdcffe1b10 a2=0 a3=7ffdcffe1afc items=0 ppid=3200 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.655881 env[1190]: time="2025-05-17T00:44:10.655591027Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:10.655881 env[1190]: time="2025-05-17T00:44:10.655638811Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:10.655881 env[1190]: time="2025-05-17T00:44:10.655649195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:10.624000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:10.656241 env[1190]: time="2025-05-17T00:44:10.656180306Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc pid=4201 runtime=io.containerd.runc.v2 May 17 00:44:10.661420 kernel: audit: type=1327 audit(1747442650.624:1315): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:10.687331 systemd[1]: Started cri-containerd-5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc.scope. May 17 00:44:10.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.735236 kernel: audit: type=1400 audit(1747442650.729:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.735337 kernel: audit: type=1400 audit(1747442650.729:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.735359 kernel: audit: type=1400 audit(1747442650.729:1318): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.743046 kernel: audit: type=1400 audit(1747442650.729:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.743138 kernel: audit: type=1400 audit(1747442650.729:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.743166 kernel: audit: type=1400 audit(1747442650.729:1321): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.747670 kernel: audit: type=1400 audit(1747442650.729:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.731000 audit: BPF prog-id=200 op=LOAD May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4201 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653239333832343631356564616662316233653634303866353064 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4201 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653239333832343631356564616662316233653634303866353064 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit: BPF prog-id=201 op=LOAD May 17 00:44:10.736000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f1d90 items=0 ppid=4201 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653239333832343631356564616662316233653634303866353064 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit: BPF prog-id=202 op=LOAD May 17 00:44:10.736000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f1dd8 items=0 ppid=4201 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653239333832343631356564616662316233653634303866353064 May 17 00:44:10.736000 audit: BPF prog-id=202 op=UNLOAD May 17 00:44:10.736000 audit: BPF prog-id=201 op=UNLOAD May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:10.736000 audit: BPF prog-id=203 op=LOAD May 17 00:44:10.736000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e81e8 items=0 ppid=4201 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:10.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653239333832343631356564616662316233653634303866353064 May 17 00:44:10.784760 env[1190]: time="2025-05-17T00:44:10.784707320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-f6rvs,Uid:e451f6f0-3693-459e-a9c7-dc41b8be0c59,Namespace:calico-system,Attempt:1,} returns sandbox id \"5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc\"" May 17 00:44:11.429146 kubelet[1930]: E0517 00:44:11.429106 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:11.524392 systemd-networkd[1005]: cali3d042b0cbbe: Gained IPv6LL May 17 00:44:11.652550 systemd-networkd[1005]: cali5bad7d3eeee: Gained IPv6LL May 17 00:44:11.783565 systemd-networkd[1005]: cali9e2c106b2ec: Gained IPv6LL May 17 00:44:11.960162 env[1190]: time="2025-05-17T00:44:11.959350166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:11.960162 env[1190]: time="2025-05-17T00:44:11.960102837Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:11.961584 env[1190]: time="2025-05-17T00:44:11.961549544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:11.964048 env[1190]: time="2025-05-17T00:44:11.963995687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:11.969339 env[1190]: time="2025-05-17T00:44:11.966442823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:44:11.972673 env[1190]: time="2025-05-17T00:44:11.972625942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:44:11.978257 env[1190]: time="2025-05-17T00:44:11.978204935Z" level=info msg="CreateContainer within sandbox \"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:44:11.992997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690006099.mount: Deactivated successfully. May 17 00:44:12.001548 env[1190]: time="2025-05-17T00:44:12.001497315Z" level=info msg="CreateContainer within sandbox \"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1be3833c46572aeda9835e90bd1b5e7a5868e7a3d9682d20f306bfc2fd930c29\"" May 17 00:44:12.002244 env[1190]: time="2025-05-17T00:44:12.002217063Z" level=info msg="StartContainer for \"1be3833c46572aeda9835e90bd1b5e7a5868e7a3d9682d20f306bfc2fd930c29\"" May 17 00:44:12.044466 systemd[1]: Started cri-containerd-1be3833c46572aeda9835e90bd1b5e7a5868e7a3d9682d20f306bfc2fd930c29.scope. May 17 00:44:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.071000 audit: BPF prog-id=204 op=LOAD May 17 00:44:12.072000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.072000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3736 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653338333363343635373261656461393833356539306264316235 May 17 00:44:12.072000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.072000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3736 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653338333363343635373261656461393833356539306264316235 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.073000 audit: BPF prog-id=205 op=LOAD May 17 00:44:12.073000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001d8cf0 items=0 ppid=3736 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653338333363343635373261656461393833356539306264316235 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.074000 audit: BPF prog-id=206 op=LOAD May 17 00:44:12.074000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001d8d38 items=0 ppid=3736 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653338333363343635373261656461393833356539306264316235 May 17 00:44:12.074000 audit: BPF prog-id=206 op=UNLOAD May 17 00:44:12.075000 audit: BPF prog-id=205 op=UNLOAD May 17 00:44:12.075000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:12.075000 audit: BPF prog-id=207 op=LOAD May 17 00:44:12.075000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001d9148 items=0 ppid=3736 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653338333363343635373261656461393833356539306264316235 May 17 00:44:12.115826 env[1190]: time="2025-05-17T00:44:12.115763527Z" level=info msg="StartContainer for \"1be3833c46572aeda9835e90bd1b5e7a5868e7a3d9682d20f306bfc2fd930c29\" returns successfully" May 17 00:44:12.309719 systemd[1]: run-containerd-runc-k8s.io-1be3833c46572aeda9835e90bd1b5e7a5868e7a3d9682d20f306bfc2fd930c29-runc.KyBfpn.mount: Deactivated successfully. May 17 00:44:12.480000 audit[4275]: NETFILTER_CFG table=filter:122 family=2 entries=14 op=nft_register_rule pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:12.480000 audit[4275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdaa320c10 a2=0 a3=7ffdaa320bfc items=0 ppid=2028 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:12.485000 audit[4275]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:12.485000 audit[4275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdaa320c10 a2=0 a3=7ffdaa320bfc items=0 ppid=2028 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:12.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:13.438494 kubelet[1930]: I0517 00:44:13.438438 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:44:13.462084 env[1190]: time="2025-05-17T00:44:13.462038327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:13.464323 env[1190]: time="2025-05-17T00:44:13.464268024Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:13.466213 env[1190]: time="2025-05-17T00:44:13.466182523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:13.468097 env[1190]: time="2025-05-17T00:44:13.468066750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:13.469038 env[1190]: time="2025-05-17T00:44:13.469005369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:44:13.472774 env[1190]: time="2025-05-17T00:44:13.472723722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:44:13.473998 env[1190]: time="2025-05-17T00:44:13.473965143Z" level=info msg="CreateContainer within sandbox \"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:44:13.495803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3488302779.mount: Deactivated successfully. May 17 00:44:13.503246 env[1190]: time="2025-05-17T00:44:13.503171748Z" level=info msg="CreateContainer within sandbox \"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"be70bf3dd92d03bd3e787a5ad7dd5f5611c03faad96680c2175a9a94a294aebe\"" May 17 00:44:13.504405 env[1190]: time="2025-05-17T00:44:13.504331676Z" level=info msg="StartContainer for \"be70bf3dd92d03bd3e787a5ad7dd5f5611c03faad96680c2175a9a94a294aebe\"" May 17 00:44:13.552881 systemd[1]: run-containerd-runc-k8s.io-be70bf3dd92d03bd3e787a5ad7dd5f5611c03faad96680c2175a9a94a294aebe-runc.Uufd7b.mount: Deactivated successfully. May 17 00:44:13.566199 systemd[1]: Started cri-containerd-be70bf3dd92d03bd3e787a5ad7dd5f5611c03faad96680c2175a9a94a294aebe.scope. May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f3308f62a48 items=0 ppid=3694 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:13.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373062663364643932643033626433653738376135616437646435 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit: BPF prog-id=208 op=LOAD May 17 00:44:13.671000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002163d8 items=0 ppid=3694 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:13.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373062663364643932643033626433653738376135616437646435 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit: BPF prog-id=209 op=LOAD May 17 00:44:13.671000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000216428 items=0 ppid=3694 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:13.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373062663364643932643033626433653738376135616437646435 May 17 00:44:13.671000 audit: BPF prog-id=209 op=UNLOAD May 17 00:44:13.671000 audit: BPF prog-id=208 op=UNLOAD May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:13.671000 audit: BPF prog-id=210 op=LOAD May 17 00:44:13.671000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002164b8 items=0 ppid=3694 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:13.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373062663364643932643033626433653738376135616437646435 May 17 00:44:13.700243 env[1190]: time="2025-05-17T00:44:13.700079932Z" level=info msg="StartContainer for \"be70bf3dd92d03bd3e787a5ad7dd5f5611c03faad96680c2175a9a94a294aebe\" returns successfully" May 17 00:44:13.952000 audit[4254]: AVC avc: denied { watch } for pid=4254 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_43_52.415271529/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c349 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c69,c349 tclass=file permissive=0 May 17 00:44:13.952000 audit[4254]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009eecc0 a2=fc6 a3=0 items=0 ppid=3736 pid=4254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c349 key=(null) May 17 00:44:13.952000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:13.998387 kubelet[1930]: I0517 00:44:13.998279 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65f5b4d999-h99gw" podStartSLOduration=29.873815192 podStartE2EDuration="33.998254828s" podCreationTimestamp="2025-05-17 00:43:40 +0000 UTC" firstStartedPulling="2025-05-17 00:44:07.847668235 +0000 UTC m=+42.907955032" lastFinishedPulling="2025-05-17 00:44:11.972107871 +0000 UTC m=+47.032394668" observedRunningTime="2025-05-17 00:44:12.449648175 +0000 UTC m=+47.509934980" watchObservedRunningTime="2025-05-17 00:44:13.998254828 +0000 UTC m=+49.058541633" May 17 00:44:14.033000 audit[4316]: NETFILTER_CFG table=filter:124 family=2 entries=13 op=nft_register_rule pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:14.033000 audit[4316]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcc4e65cb0 a2=0 a3=7ffcc4e65c9c items=0 ppid=2028 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:14.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:14.037000 audit[4316]: NETFILTER_CFG table=nat:125 family=2 entries=27 op=nft_register_chain pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:14.037000 audit[4316]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcc4e65cb0 a2=0 a3=7ffcc4e65c9c items=0 ppid=2028 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:14.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:14.358560 kubelet[1930]: I0517 00:44:14.358486 1930 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:44:14.360330 kubelet[1930]: I0517 00:44:14.360262 1930 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:44:19.433524 env[1190]: time="2025-05-17T00:44:19.433463276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.436168 env[1190]: time="2025-05-17T00:44:19.436127196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.438147 env[1190]: time="2025-05-17T00:44:19.438112796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.439982 env[1190]: time="2025-05-17T00:44:19.439948212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.440670 env[1190]: time="2025-05-17T00:44:19.440641853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:44:19.442424 env[1190]: time="2025-05-17T00:44:19.442396037Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:44:19.509732 env[1190]: time="2025-05-17T00:44:19.509673941Z" level=info msg="CreateContainer within sandbox \"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:44:19.524784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2942089690.mount: Deactivated successfully. May 17 00:44:19.531170 env[1190]: time="2025-05-17T00:44:19.531099131Z" level=info msg="CreateContainer within sandbox \"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a1efec9835c28e0443a301dd6c9ffa54ce0889b0c379847884062f83732ab4e3\"" May 17 00:44:19.533358 env[1190]: time="2025-05-17T00:44:19.533254030Z" level=info msg="StartContainer for \"a1efec9835c28e0443a301dd6c9ffa54ce0889b0c379847884062f83732ab4e3\"" May 17 00:44:19.569408 systemd[1]: Started cri-containerd-a1efec9835c28e0443a301dd6c9ffa54ce0889b0c379847884062f83732ab4e3.scope. May 17 00:44:19.597926 kernel: kauditd_printk_skb: 165 callbacks suppressed May 17 00:44:19.600256 kernel: audit: type=1400 audit(1747442659.593:1363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604829 kernel: audit: type=1400 audit(1747442659.593:1364): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604907 kernel: audit: type=1400 audit(1747442659.593:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604930 kernel: audit: type=1400 audit(1747442659.593:1366): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604959 kernel: audit: type=1400 audit(1747442659.593:1367): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.609657 kernel: audit: type=1400 audit(1747442659.593:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.614936 kernel: audit: type=1400 audit(1747442659.593:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.615030 kernel: audit: type=1400 audit(1747442659.593:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.615065 kernel: audit: type=1400 audit(1747442659.593:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.620105 kernel: audit: type=1400 audit(1747442659.596:1372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.596000 audit: BPF prog-id=211 op=LOAD May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4056 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656665633938333563323865303434336133303164643663396666 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4056 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656665633938333563323865303434336133303164643663396666 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.597000 audit: BPF prog-id=212 op=LOAD May 17 00:44:19.597000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d4030 items=0 ppid=4056 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656665633938333563323865303434336133303164643663396666 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.604000 audit: BPF prog-id=213 op=LOAD May 17 00:44:19.604000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d4078 items=0 ppid=4056 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656665633938333563323865303434336133303164643663396666 May 17 00:44:19.605000 audit: BPF prog-id=213 op=UNLOAD May 17 00:44:19.606000 audit: BPF prog-id=212 op=UNLOAD May 17 00:44:19.606000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.606000 audit: BPF prog-id=214 op=LOAD May 17 00:44:19.606000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4488 items=0 ppid=4056 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656665633938333563323865303434336133303164643663396666 May 17 00:44:19.665939 env[1190]: time="2025-05-17T00:44:19.665889642Z" level=info msg="StartContainer for \"a1efec9835c28e0443a301dd6c9ffa54ce0889b0c379847884062f83732ab4e3\" returns successfully" May 17 00:44:19.825078 env[1190]: time="2025-05-17T00:44:19.825019764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.825879 env[1190]: time="2025-05-17T00:44:19.825848837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.827039 env[1190]: time="2025-05-17T00:44:19.827005083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.828414 env[1190]: time="2025-05-17T00:44:19.828385426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:19.828870 env[1190]: time="2025-05-17T00:44:19.828842101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:44:19.830941 env[1190]: time="2025-05-17T00:44:19.830550680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:44:19.833869 env[1190]: time="2025-05-17T00:44:19.833837361Z" level=info msg="CreateContainer within sandbox \"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:44:19.855587 env[1190]: time="2025-05-17T00:44:19.855522453Z" level=info msg="CreateContainer within sandbox \"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a74a493658602b4cb8c467a2e9607285083acc7d07f5b49c8ae81480d1181892\"" May 17 00:44:19.858187 env[1190]: time="2025-05-17T00:44:19.858146068Z" level=info msg="StartContainer for \"a74a493658602b4cb8c467a2e9607285083acc7d07f5b49c8ae81480d1181892\"" May 17 00:44:19.889207 systemd[1]: Started cri-containerd-a74a493658602b4cb8c467a2e9607285083acc7d07f5b49c8ae81480d1181892.scope. May 17 00:44:19.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.909000 audit: BPF prog-id=215 op=LOAD May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4101 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346134393336353836303262346362386334363761326539363037 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4101 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346134393336353836303262346362386334363761326539363037 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit: BPF prog-id=216 op=LOAD May 17 00:44:19.911000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00039c5e0 items=0 ppid=4101 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346134393336353836303262346362386334363761326539363037 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit: BPF prog-id=217 op=LOAD May 17 00:44:19.911000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00039c628 items=0 ppid=4101 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346134393336353836303262346362386334363761326539363037 May 17 00:44:19.911000 audit: BPF prog-id=217 op=UNLOAD May 17 00:44:19.911000 audit: BPF prog-id=216 op=UNLOAD May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:19.911000 audit: BPF prog-id=218 op=LOAD May 17 00:44:19.911000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039ca38 items=0 ppid=4101 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:19.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346134393336353836303262346362386334363761326539363037 May 17 00:44:19.949446 env[1190]: time="2025-05-17T00:44:19.949378986Z" level=info msg="StartContainer for \"a74a493658602b4cb8c467a2e9607285083acc7d07f5b49c8ae81480d1181892\" returns successfully" May 17 00:44:20.044659 env[1190]: time="2025-05-17T00:44:20.044593766Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:20.045507 env[1190]: time="2025-05-17T00:44:20.045445018Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:20.048609 kubelet[1930]: E0517 00:44:20.048519 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:20.051465 kubelet[1930]: E0517 00:44:20.051412 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:20.051910 env[1190]: time="2025-05-17T00:44:20.051863483Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:44:20.061847 kubelet[1930]: E0517 00:44:20.061784 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4g27k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-f6rvs_calico-system(e451f6f0-3693-459e-a9c7-dc41b8be0c59): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:20.064691 kubelet[1930]: E0517 00:44:20.064595 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:44:20.257111 env[1190]: time="2025-05-17T00:44:20.257016299Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:20.257754 env[1190]: time="2025-05-17T00:44:20.257712761Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:20.258179 kubelet[1930]: E0517 00:44:20.258137 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:20.258342 kubelet[1930]: E0517 00:44:20.258323 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:20.258982 kubelet[1930]: E0517 00:44:20.258932 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c2812b6c12664ddd8ce606719b2bc444,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:20.261366 env[1190]: time="2025-05-17T00:44:20.261324822Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:44:20.345000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:20.345000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024d8c80 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:20.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:20.345000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:20.345000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000952210 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:20.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:20.502039 env[1190]: time="2025-05-17T00:44:20.493837033Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:20.502039 env[1190]: time="2025-05-17T00:44:20.494506813Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:20.504519 kubelet[1930]: E0517 00:44:20.504481 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:20.504648 kubelet[1930]: E0517 00:44:20.504627 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:20.504963 kubelet[1930]: E0517 00:44:20.504926 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:20.507951 kubelet[1930]: E0517 00:44:20.507353 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:20.522953 kubelet[1930]: E0517 00:44:20.522917 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:44:20.565113 kubelet[1930]: I0517 00:44:20.560951 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-f5dcv" podStartSLOduration=30.834541604 podStartE2EDuration="36.559660882s" podCreationTimestamp="2025-05-17 00:43:44 +0000 UTC" firstStartedPulling="2025-05-17 00:44:07.745647305 +0000 UTC m=+42.805934102" lastFinishedPulling="2025-05-17 00:44:13.470766583 +0000 UTC m=+48.531053380" observedRunningTime="2025-05-17 00:44:14.457439775 +0000 UTC m=+49.517726602" watchObservedRunningTime="2025-05-17 00:44:20.559660882 +0000 UTC m=+55.619947686" May 17 00:44:20.565631 kubelet[1930]: I0517 00:44:20.565588 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6984db5bf8-ssqjf" podStartSLOduration=27.105726273 podStartE2EDuration="36.565568663s" podCreationTimestamp="2025-05-17 00:43:44 +0000 UTC" firstStartedPulling="2025-05-17 00:44:09.982229675 +0000 UTC m=+45.042516469" lastFinishedPulling="2025-05-17 00:44:19.442072072 +0000 UTC m=+54.502358859" observedRunningTime="2025-05-17 00:44:20.554504165 +0000 UTC m=+55.614790972" watchObservedRunningTime="2025-05-17 00:44:20.565568663 +0000 UTC m=+55.625855468" May 17 00:44:20.612526 kubelet[1930]: I0517 00:44:20.612455 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65f5b4d999-8lqmt" podStartSLOduration=30.790907668 podStartE2EDuration="40.612426408s" podCreationTimestamp="2025-05-17 00:43:40 +0000 UTC" firstStartedPulling="2025-05-17 00:44:10.00869164 +0000 UTC m=+45.068978436" lastFinishedPulling="2025-05-17 00:44:19.830210378 +0000 UTC m=+54.890497176" observedRunningTime="2025-05-17 00:44:20.607929839 +0000 UTC m=+55.668216651" watchObservedRunningTime="2025-05-17 00:44:20.612426408 +0000 UTC m=+55.672713213" May 17 00:44:20.648000 audit[4433]: NETFILTER_CFG table=filter:126 family=2 entries=12 op=nft_register_rule pid=4433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:20.648000 audit[4433]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0cb92e90 a2=0 a3=7ffc0cb92e7c items=0 ppid=2028 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:20.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:20.660000 audit[4433]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=4433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:20.660000 audit[4433]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc0cb92e90 a2=0 a3=7ffc0cb92e7c items=0 ppid=2028 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:20.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:20.702000 audit[4437]: NETFILTER_CFG table=filter:128 family=2 entries=12 op=nft_register_rule pid=4437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:20.702000 audit[4437]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffff0bd87a0 a2=0 a3=7ffff0bd878c items=0 ppid=2028 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:20.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:20.710000 audit[4437]: NETFILTER_CFG table=nat:129 family=2 entries=30 op=nft_register_rule pid=4437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:20.710000 audit[4437]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffff0bd87a0 a2=0 a3=7ffff0bd878c items=0 ppid=2028 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:20.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:21.198000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.198000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e4dce10 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.198000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.199000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.199000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c013b56ac0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.202000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.202000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e205ec0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.205000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526386 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.205000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e4dcea0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.243000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.243000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0138188a0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.244000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:21.244000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e4dcfc0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:44:21.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:21.524622 kubelet[1930]: I0517 00:44:21.524588 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:44:21.964000 audit[4391]: AVC avc: denied { watch } for pid=4391 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_43_52.2332460528/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c349 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c91,c349 tclass=file permissive=0 May 17 00:44:21.964000 audit[4391]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ad8160 a2=fc6 a3=0 items=0 ppid=4101 pid=4391 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c349 key=(null) May 17 00:44:21.964000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:23.230317 systemd[1]: Started sshd@7-134.199.236.151:22-147.75.109.163:47548.service. May 17 00:44:23.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-134.199.236.151:22-147.75.109.163:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:23.336000 audit[4440]: USER_ACCT pid=4440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:23.338151 sshd[4440]: Accepted publickey for core from 147.75.109.163 port 47548 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:23.338000 audit[4440]: CRED_ACQ pid=4440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:23.339000 audit[4440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe75781bc0 a2=3 a3=0 items=0 ppid=1 pid=4440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:23.339000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:23.342474 sshd[4440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:23.356198 systemd[1]: Started session-8.scope. May 17 00:44:23.356949 systemd-logind[1179]: New session 8 of user core. May 17 00:44:23.364000 audit[4440]: USER_START pid=4440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:23.367000 audit[4444]: CRED_ACQ pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.194727 sshd[4440]: pam_unix(sshd:session): session closed for user core May 17 00:44:24.195000 audit[4440]: USER_END pid=4440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.196000 audit[4440]: CRED_DISP pid=4440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.199273 systemd[1]: sshd@7-134.199.236.151:22-147.75.109.163:47548.service: Deactivated successfully. May 17 00:44:24.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-134.199.236.151:22-147.75.109.163:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:24.200552 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:44:24.201728 systemd-logind[1179]: Session 8 logged out. Waiting for processes to exit. May 17 00:44:24.203058 systemd-logind[1179]: Removed session 8. May 17 00:44:25.189963 env[1190]: time="2025-05-17T00:44:25.189827700Z" level=info msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" May 17 00:44:25.527366 kernel: kauditd_printk_skb: 154 callbacks suppressed May 17 00:44:25.528990 kernel: audit: type=1400 audit(1747442665.520:1421): avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.529114 kernel: audit: type=1300 audit(1747442665.520:1421): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007671a0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.520000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.520000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007671a0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.538930 kernel: audit: type=1327 audit(1747442665.520:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.539087 kernel: audit: type=1400 audit(1747442665.522:1422): avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.539109 kernel: audit: type=1300 audit(1747442665.522:1422): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007671c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.522000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.522000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007671c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.522000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.557758 kernel: audit: type=1327 audit(1747442665.522:1422): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.557945 kernel: audit: type=1400 audit(1747442665.522:1423): avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.557979 kernel: audit: type=1300 audit(1747442665.522:1423): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007674c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.522000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007674c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.565349 kernel: audit: type=1327 audit(1747442665.522:1423): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.566139 kernel: audit: type=1400 audit(1747442665.522:1424): avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.522000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:25.522000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a75c40 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:44:25.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.433 [WARNING][4469] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d0ccdba1-af4b-4719-bc28-bd16d9c3505b", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d", Pod:"coredns-668d6bf9bc-hhhm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib14e2ecdb4e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.437 [INFO][4469] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.437 [INFO][4469] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" iface="eth0" netns="" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.437 [INFO][4469] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.437 [INFO][4469] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.657 [INFO][4476] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.659 [INFO][4476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.659 [INFO][4476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.672 [WARNING][4476] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.673 [INFO][4476] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.675 [INFO][4476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:25.680679 env[1190]: 2025-05-17 00:44:25.678 [INFO][4469] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.681820 env[1190]: time="2025-05-17T00:44:25.681319050Z" level=info msg="TearDown network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" successfully" May 17 00:44:25.681820 env[1190]: time="2025-05-17T00:44:25.681383988Z" level=info msg="StopPodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" returns successfully" May 17 00:44:25.713365 env[1190]: time="2025-05-17T00:44:25.713224124Z" level=info msg="RemovePodSandbox for \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" May 17 00:44:25.713866 env[1190]: time="2025-05-17T00:44:25.713761099Z" level=info msg="Forcibly stopping sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\"" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.767 [WARNING][4491] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d0ccdba1-af4b-4719-bc28-bd16d9c3505b", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"698ad9cf1884138d1ae66ebd9ac80d44f5db49d78b1d084ea141b9e109d6f06d", Pod:"coredns-668d6bf9bc-hhhm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib14e2ecdb4e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.768 [INFO][4491] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.768 [INFO][4491] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" iface="eth0" netns="" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.768 [INFO][4491] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.768 [INFO][4491] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.819 [INFO][4499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.820 [INFO][4499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.820 [INFO][4499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.830 [WARNING][4499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.830 [INFO][4499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" HandleID="k8s-pod-network.1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--hhhm4-eth0" May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.833 [INFO][4499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:25.842849 env[1190]: 2025-05-17 00:44:25.836 [INFO][4491] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09" May 17 00:44:25.842849 env[1190]: time="2025-05-17T00:44:25.841342311Z" level=info msg="TearDown network for sandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" successfully" May 17 00:44:25.847100 env[1190]: time="2025-05-17T00:44:25.847047181Z" level=info msg="RemovePodSandbox \"1c7445865320ca69ffde6b09a248f8990fc814bb66132439f92e2a5203397c09\" returns successfully" May 17 00:44:25.850846 env[1190]: time="2025-05-17T00:44:25.850776265Z" level=info msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.929 [WARNING][4514] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"8afe8629-8ece-4e93-aff0-9b5c027ae04a", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2", Pod:"calico-apiserver-65f5b4d999-h99gw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali196fd8c46d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.929 [INFO][4514] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.929 [INFO][4514] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" iface="eth0" netns="" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.929 [INFO][4514] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.929 [INFO][4514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.958 [INFO][4522] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.958 [INFO][4522] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.958 [INFO][4522] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.967 [WARNING][4522] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.967 [INFO][4522] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.970 [INFO][4522] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:25.976307 env[1190]: 2025-05-17 00:44:25.973 [INFO][4514] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:25.977596 env[1190]: time="2025-05-17T00:44:25.976326148Z" level=info msg="TearDown network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" successfully" May 17 00:44:25.977596 env[1190]: time="2025-05-17T00:44:25.976363605Z" level=info msg="StopPodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" returns successfully" May 17 00:44:25.977834 env[1190]: time="2025-05-17T00:44:25.977777802Z" level=info msg="RemovePodSandbox for \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" May 17 00:44:25.978043 env[1190]: time="2025-05-17T00:44:25.977975991Z" level=info msg="Forcibly stopping sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\"" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.045 [WARNING][4536] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"8afe8629-8ece-4e93-aff0-9b5c027ae04a", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b8f4ec8736e5df76c7e7cc2406c79c85fdbca73202634e6f9275f0d2f10dede2", Pod:"calico-apiserver-65f5b4d999-h99gw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali196fd8c46d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.046 [INFO][4536] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.046 [INFO][4536] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" iface="eth0" netns="" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.046 [INFO][4536] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.046 [INFO][4536] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.087 [INFO][4543] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.087 [INFO][4543] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.087 [INFO][4543] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.096 [WARNING][4543] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.096 [INFO][4543] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" HandleID="k8s-pod-network.ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--h99gw-eth0" May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.099 [INFO][4543] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.105816 env[1190]: 2025-05-17 00:44:26.101 [INFO][4536] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d" May 17 00:44:26.105816 env[1190]: time="2025-05-17T00:44:26.104862589Z" level=info msg="TearDown network for sandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" successfully" May 17 00:44:26.110553 env[1190]: time="2025-05-17T00:44:26.110485050Z" level=info msg="RemovePodSandbox \"ea2b575cac8aee0ad965c8d67906c55538d16bf19f639cb57da7843f755ba36d\" returns successfully" May 17 00:44:26.111437 env[1190]: time="2025-05-17T00:44:26.111389434Z" level=info msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.157 [WARNING][4558] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.158 [INFO][4558] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.158 [INFO][4558] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" iface="eth0" netns="" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.158 [INFO][4558] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.158 [INFO][4558] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.186 [INFO][4565] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.186 [INFO][4565] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.186 [INFO][4565] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.194 [WARNING][4565] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.194 [INFO][4565] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.197 [INFO][4565] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.202334 env[1190]: 2025-05-17 00:44:26.199 [INFO][4558] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.203401 env[1190]: time="2025-05-17T00:44:26.203357273Z" level=info msg="TearDown network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" successfully" May 17 00:44:26.203507 env[1190]: time="2025-05-17T00:44:26.203481221Z" level=info msg="StopPodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" returns successfully" May 17 00:44:26.204591 env[1190]: time="2025-05-17T00:44:26.204552052Z" level=info msg="RemovePodSandbox for \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" May 17 00:44:26.204719 env[1190]: time="2025-05-17T00:44:26.204595337Z" level=info msg="Forcibly stopping sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\"" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.257 [WARNING][4580] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" WorkloadEndpoint="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.257 [INFO][4580] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.257 [INFO][4580] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" iface="eth0" netns="" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.257 [INFO][4580] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.257 [INFO][4580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.288 [INFO][4587] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.288 [INFO][4587] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.288 [INFO][4587] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.299 [WARNING][4587] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.299 [INFO][4587] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" HandleID="k8s-pod-network.6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" Workload="ci--3510.3.7--n--f9c20123e0-k8s-whisker--6566dbf9b5--l8nkk-eth0" May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.302 [INFO][4587] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.307277 env[1190]: 2025-05-17 00:44:26.304 [INFO][4580] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501" May 17 00:44:26.308546 env[1190]: time="2025-05-17T00:44:26.308064464Z" level=info msg="TearDown network for sandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" successfully" May 17 00:44:26.311772 env[1190]: time="2025-05-17T00:44:26.311719617Z" level=info msg="RemovePodSandbox \"6f44da8669c5a102dbaac94884a8722c47552fdfdd1eeea486290db5cd82f501\" returns successfully" May 17 00:44:26.312702 env[1190]: time="2025-05-17T00:44:26.312657593Z" level=info msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.391 [WARNING][4601] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"edfc8f67-761b-4428-b703-bd8f02b95a90", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091", Pod:"calico-apiserver-65f5b4d999-8lqmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bad7d3eeee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.392 [INFO][4601] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.392 [INFO][4601] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" iface="eth0" netns="" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.392 [INFO][4601] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.392 [INFO][4601] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.437 [INFO][4608] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.438 [INFO][4608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.438 [INFO][4608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.447 [WARNING][4608] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.447 [INFO][4608] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.450 [INFO][4608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.457462 env[1190]: 2025-05-17 00:44:26.452 [INFO][4601] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.458451 env[1190]: time="2025-05-17T00:44:26.458405619Z" level=info msg="TearDown network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" successfully" May 17 00:44:26.458577 env[1190]: time="2025-05-17T00:44:26.458545129Z" level=info msg="StopPodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" returns successfully" May 17 00:44:26.459439 env[1190]: time="2025-05-17T00:44:26.459400810Z" level=info msg="RemovePodSandbox for \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" May 17 00:44:26.459835 env[1190]: time="2025-05-17T00:44:26.459725527Z" level=info msg="Forcibly stopping sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\"" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.514 [WARNING][4622] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0", GenerateName:"calico-apiserver-65f5b4d999-", Namespace:"calico-apiserver", SelfLink:"", UID:"edfc8f67-761b-4428-b703-bd8f02b95a90", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f5b4d999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"b7c8b0d9439c56136041a5c41dda74a2915ec6dad84555fb99ff44f07a428091", Pod:"calico-apiserver-65f5b4d999-8lqmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bad7d3eeee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.514 [INFO][4622] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.514 [INFO][4622] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" iface="eth0" netns="" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.514 [INFO][4622] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.514 [INFO][4622] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.547 [INFO][4629] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.547 [INFO][4629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.547 [INFO][4629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.556 [WARNING][4629] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.556 [INFO][4629] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" HandleID="k8s-pod-network.5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--apiserver--65f5b4d999--8lqmt-eth0" May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.561 [INFO][4629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.566821 env[1190]: 2025-05-17 00:44:26.564 [INFO][4622] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5" May 17 00:44:26.567916 env[1190]: time="2025-05-17T00:44:26.567613505Z" level=info msg="TearDown network for sandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" successfully" May 17 00:44:26.571282 env[1190]: time="2025-05-17T00:44:26.571213447Z" level=info msg="RemovePodSandbox \"5b5e95c0abc5b3111cdfd8f48b8ec271d977a216fd9697bf544a811b73cec1b5\" returns successfully" May 17 00:44:26.572214 env[1190]: time="2025-05-17T00:44:26.572177866Z" level=info msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.635 [WARNING][4644] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"73b60263-1259-4e7b-9da7-c18fb7cb6fd2", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9", Pod:"coredns-668d6bf9bc-mg4ql", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc88fe1c829", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.635 [INFO][4644] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.636 [INFO][4644] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" iface="eth0" netns="" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.636 [INFO][4644] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.636 [INFO][4644] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.679 [INFO][4651] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.680 [INFO][4651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.680 [INFO][4651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.689 [WARNING][4651] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.690 [INFO][4651] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.692 [INFO][4651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.698734 env[1190]: 2025-05-17 00:44:26.695 [INFO][4644] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.699834 env[1190]: time="2025-05-17T00:44:26.699400620Z" level=info msg="TearDown network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" successfully" May 17 00:44:26.699925 env[1190]: time="2025-05-17T00:44:26.699452426Z" level=info msg="StopPodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" returns successfully" May 17 00:44:26.700902 env[1190]: time="2025-05-17T00:44:26.700834610Z" level=info msg="RemovePodSandbox for \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" May 17 00:44:26.701066 env[1190]: time="2025-05-17T00:44:26.700899415Z" level=info msg="Forcibly stopping sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\"" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.767 [WARNING][4666] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"73b60263-1259-4e7b-9da7-c18fb7cb6fd2", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"6ceb2e879803f735548bbdb74d398565636b275ef27e349f91120b0646abe2b9", Pod:"coredns-668d6bf9bc-mg4ql", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc88fe1c829", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.767 [INFO][4666] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.767 [INFO][4666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" iface="eth0" netns="" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.767 [INFO][4666] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.767 [INFO][4666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.801 [INFO][4673] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.801 [INFO][4673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.801 [INFO][4673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.809 [WARNING][4673] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.810 [INFO][4673] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" HandleID="k8s-pod-network.ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" Workload="ci--3510.3.7--n--f9c20123e0-k8s-coredns--668d6bf9bc--mg4ql-eth0" May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.812 [INFO][4673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.817713 env[1190]: 2025-05-17 00:44:26.815 [INFO][4666] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5" May 17 00:44:26.819503 env[1190]: time="2025-05-17T00:44:26.818401744Z" level=info msg="TearDown network for sandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" successfully" May 17 00:44:26.824390 env[1190]: time="2025-05-17T00:44:26.824278595Z" level=info msg="RemovePodSandbox \"ecd023adae08edcf8f7998e1f9afbba986efa4c8165cdca71e4032a5d1bc64e5\" returns successfully" May 17 00:44:26.825463 env[1190]: time="2025-05-17T00:44:26.825393766Z" level=info msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.887 [WARNING][4688] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0", GenerateName:"calico-kube-controllers-6984db5bf8-", Namespace:"calico-system", SelfLink:"", UID:"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6984db5bf8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57", Pod:"calico-kube-controllers-6984db5bf8-ssqjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3d042b0cbbe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.887 [INFO][4688] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.887 [INFO][4688] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" iface="eth0" netns="" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.887 [INFO][4688] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.887 [INFO][4688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.925 [INFO][4695] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.926 [INFO][4695] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.926 [INFO][4695] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.934 [WARNING][4695] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.934 [INFO][4695] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.937 [INFO][4695] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:26.943313 env[1190]: 2025-05-17 00:44:26.940 [INFO][4688] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:26.944433 env[1190]: time="2025-05-17T00:44:26.944379345Z" level=info msg="TearDown network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" successfully" May 17 00:44:26.944585 env[1190]: time="2025-05-17T00:44:26.944553503Z" level=info msg="StopPodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" returns successfully" May 17 00:44:26.945583 env[1190]: time="2025-05-17T00:44:26.945539265Z" level=info msg="RemovePodSandbox for \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" May 17 00:44:26.945697 env[1190]: time="2025-05-17T00:44:26.945586088Z" level=info msg="Forcibly stopping sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\"" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.005 [WARNING][4710] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0", GenerateName:"calico-kube-controllers-6984db5bf8-", Namespace:"calico-system", SelfLink:"", UID:"c4bb3358-e28d-4ca6-85a3-44bffbfd8fb1", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6984db5bf8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"144570bc6b91808dcd57e78af25ace15ba7eb4567e59cb30de19d226cc6bce57", Pod:"calico-kube-controllers-6984db5bf8-ssqjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3d042b0cbbe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.006 [INFO][4710] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.006 [INFO][4710] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" iface="eth0" netns="" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.006 [INFO][4710] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.006 [INFO][4710] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.049 [INFO][4718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.049 [INFO][4718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.049 [INFO][4718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.057 [WARNING][4718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.057 [INFO][4718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" HandleID="k8s-pod-network.da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" Workload="ci--3510.3.7--n--f9c20123e0-k8s-calico--kube--controllers--6984db5bf8--ssqjf-eth0" May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.060 [INFO][4718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:27.066029 env[1190]: 2025-05-17 00:44:27.062 [INFO][4710] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138" May 17 00:44:27.067182 env[1190]: time="2025-05-17T00:44:27.067127149Z" level=info msg="TearDown network for sandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" successfully" May 17 00:44:27.071597 env[1190]: time="2025-05-17T00:44:27.071427064Z" level=info msg="RemovePodSandbox \"da9abf6288d56985b13a4c57669a52de5a72b6049467e427c7933ba4a5caa138\" returns successfully" May 17 00:44:27.073514 env[1190]: time="2025-05-17T00:44:27.073459322Z" level=info msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.134 [WARNING][4732] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"e451f6f0-3693-459e-a9c7-dc41b8be0c59", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc", Pod:"goldmane-78d55f7ddc-f6rvs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.35.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali9e2c106b2ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.134 [INFO][4732] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.134 [INFO][4732] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" iface="eth0" netns="" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.134 [INFO][4732] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.134 [INFO][4732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.165 [INFO][4739] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.165 [INFO][4739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.166 [INFO][4739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.173 [WARNING][4739] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.173 [INFO][4739] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.175 [INFO][4739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:27.181193 env[1190]: 2025-05-17 00:44:27.178 [INFO][4732] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.181967 env[1190]: time="2025-05-17T00:44:27.181909384Z" level=info msg="TearDown network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" successfully" May 17 00:44:27.182108 env[1190]: time="2025-05-17T00:44:27.182081955Z" level=info msg="StopPodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" returns successfully" May 17 00:44:27.182948 env[1190]: time="2025-05-17T00:44:27.182910427Z" level=info msg="RemovePodSandbox for \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" May 17 00:44:27.183155 env[1190]: time="2025-05-17T00:44:27.183066271Z" level=info msg="Forcibly stopping sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\"" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.241 [WARNING][4753] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"e451f6f0-3693-459e-a9c7-dc41b8be0c59", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"5ee293824615edafb1b3e6408f50dd846763fc1e1512ae6aa953754c1d029edc", Pod:"goldmane-78d55f7ddc-f6rvs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.35.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali9e2c106b2ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.242 [INFO][4753] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.242 [INFO][4753] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" iface="eth0" netns="" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.242 [INFO][4753] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.242 [INFO][4753] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.277 [INFO][4760] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.278 [INFO][4760] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.278 [INFO][4760] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.287 [WARNING][4760] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.287 [INFO][4760] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" HandleID="k8s-pod-network.28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" Workload="ci--3510.3.7--n--f9c20123e0-k8s-goldmane--78d55f7ddc--f6rvs-eth0" May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.290 [INFO][4760] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:27.295857 env[1190]: 2025-05-17 00:44:27.292 [INFO][4753] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e" May 17 00:44:27.297750 env[1190]: time="2025-05-17T00:44:27.295933671Z" level=info msg="TearDown network for sandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" successfully" May 17 00:44:27.299598 env[1190]: time="2025-05-17T00:44:27.299522154Z" level=info msg="RemovePodSandbox \"28b3d94231e0efc4cccba95fda7b3626ccbb3c9192f6df4a14aa2c90314be97e\" returns successfully" May 17 00:44:27.300417 env[1190]: time="2025-05-17T00:44:27.300374588Z" level=info msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.358 [WARNING][4775] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4012fc42-c091-49aa-9549-82c50f8e5fa6", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a", Pod:"csi-node-driver-f5dcv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0fabdbe02ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.358 [INFO][4775] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.359 [INFO][4775] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" iface="eth0" netns="" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.359 [INFO][4775] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.359 [INFO][4775] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.390 [INFO][4782] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.390 [INFO][4782] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.391 [INFO][4782] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.399 [WARNING][4782] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.400 [INFO][4782] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.402 [INFO][4782] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:27.408536 env[1190]: 2025-05-17 00:44:27.405 [INFO][4775] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.410329 env[1190]: time="2025-05-17T00:44:27.409663379Z" level=info msg="TearDown network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" successfully" May 17 00:44:27.410479 env[1190]: time="2025-05-17T00:44:27.410451685Z" level=info msg="StopPodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" returns successfully" May 17 00:44:27.411590 env[1190]: time="2025-05-17T00:44:27.411540798Z" level=info msg="RemovePodSandbox for \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" May 17 00:44:27.411691 env[1190]: time="2025-05-17T00:44:27.411620500Z" level=info msg="Forcibly stopping sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\"" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.472 [WARNING][4796] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4012fc42-c091-49aa-9549-82c50f8e5fa6", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-f9c20123e0", ContainerID:"4a6961a18a76460ebb6b3295cacb5bcb5bc5222cc29061873915f6a99aef3e1a", Pod:"csi-node-driver-f5dcv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0fabdbe02ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.473 [INFO][4796] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.473 [INFO][4796] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" iface="eth0" netns="" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.473 [INFO][4796] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.473 [INFO][4796] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.499 [INFO][4803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.499 [INFO][4803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.499 [INFO][4803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.507 [WARNING][4803] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.507 [INFO][4803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" HandleID="k8s-pod-network.3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" Workload="ci--3510.3.7--n--f9c20123e0-k8s-csi--node--driver--f5dcv-eth0" May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.509 [INFO][4803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:27.514496 env[1190]: 2025-05-17 00:44:27.512 [INFO][4796] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f" May 17 00:44:27.515250 env[1190]: time="2025-05-17T00:44:27.514540088Z" level=info msg="TearDown network for sandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" successfully" May 17 00:44:27.517459 env[1190]: time="2025-05-17T00:44:27.517394978Z" level=info msg="RemovePodSandbox \"3542c1e967201d4c277e8b9c947cde4d36964e87c7b6d7d9ae70bf3ec85cb50f\" returns successfully" May 17 00:44:29.204707 systemd[1]: Started sshd@8-134.199.236.151:22-147.75.109.163:53956.service. May 17 00:44:29.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-134.199.236.151:22-147.75.109.163:53956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:29.304000 audit[4811]: USER_ACCT pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.306224 sshd[4811]: Accepted publickey for core from 147.75.109.163 port 53956 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:29.306000 audit[4811]: CRED_ACQ pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.307000 audit[4811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0d127d0 a2=3 a3=0 items=0 ppid=1 pid=4811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:29.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:29.310758 sshd[4811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:29.319736 systemd-logind[1179]: New session 9 of user core. May 17 00:44:29.321345 systemd[1]: Started session-9.scope. May 17 00:44:29.326000 audit[4811]: USER_START pid=4811 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.328000 audit[4813]: CRED_ACQ pid=4813 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.756987 sshd[4811]: pam_unix(sshd:session): session closed for user core May 17 00:44:29.757000 audit[4811]: USER_END pid=4811 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.758000 audit[4811]: CRED_DISP pid=4811 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:29.761665 systemd-logind[1179]: Session 9 logged out. Waiting for processes to exit. May 17 00:44:29.761946 systemd[1]: sshd@8-134.199.236.151:22-147.75.109.163:53956.service: Deactivated successfully. May 17 00:44:29.762877 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:44:29.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-134.199.236.151:22-147.75.109.163:53956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:29.764437 systemd-logind[1179]: Removed session 9. May 17 00:44:32.183231 env[1190]: time="2025-05-17T00:44:32.182920259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:44:32.201983 kubelet[1930]: E0517 00:44:32.201892 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:32.280304 kubelet[1930]: I0517 00:44:32.280252 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:44:32.346000 audit[4827]: NETFILTER_CFG table=filter:130 family=2 entries=12 op=nft_register_rule pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:32.348599 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:44:32.348648 kernel: audit: type=1325 audit(1747442672.346:1434): table=filter:130 family=2 entries=12 op=nft_register_rule pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:32.346000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff76768670 a2=0 a3=7fff7676865c items=0 ppid=2028 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:32.354196 kernel: audit: type=1300 audit(1747442672.346:1434): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff76768670 a2=0 a3=7fff7676865c items=0 ppid=2028 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:32.354492 kernel: audit: type=1327 audit(1747442672.346:1434): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:32.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:32.357000 audit[4827]: NETFILTER_CFG table=nat:131 family=2 entries=34 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:32.357000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff76768670 a2=0 a3=7fff7676865c items=0 ppid=2028 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:32.364007 kernel: audit: type=1325 audit(1747442672.357:1435): table=nat:131 family=2 entries=34 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:32.364127 kernel: audit: type=1300 audit(1747442672.357:1435): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff76768670 a2=0 a3=7fff7676865c items=0 ppid=2028 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:32.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:32.367319 kernel: audit: type=1327 audit(1747442672.357:1435): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:32.395517 env[1190]: time="2025-05-17T00:44:32.395462423Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:32.397913 env[1190]: time="2025-05-17T00:44:32.397820914Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:32.402336 kubelet[1930]: E0517 00:44:32.401473 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:32.406873 kubelet[1930]: E0517 00:44:32.406823 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:32.411302 kubelet[1930]: E0517 00:44:32.411185 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4g27k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-f6rvs_calico-system(e451f6f0-3693-459e-a9c7-dc41b8be0c59): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:32.413019 kubelet[1930]: E0517 00:44:32.412712 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:44:34.771399 kernel: audit: type=1130 audit(1747442674.767:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-134.199.236.151:22-147.75.109.163:53960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:34.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-134.199.236.151:22-147.75.109.163:53960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:34.767983 systemd[1]: Started sshd@9-134.199.236.151:22-147.75.109.163:53960.service. May 17 00:44:34.853000 audit[4850]: USER_ACCT pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:34.856000 audit[4850]: CRED_ACQ pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:34.860090 sshd[4850]: Accepted publickey for core from 147.75.109.163 port 53960 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:34.863745 kernel: audit: type=1101 audit(1747442674.853:1437): pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:34.863819 kernel: audit: type=1103 audit(1747442674.856:1438): pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:34.863844 kernel: audit: type=1006 audit(1747442674.856:1439): pid=4850 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:44:34.856000 audit[4850]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4efce050 a2=3 a3=0 items=0 ppid=1 pid=4850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:34.856000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:34.865412 sshd[4850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:34.874973 systemd[1]: Started session-10.scope. May 17 00:44:34.875396 systemd-logind[1179]: New session 10 of user core. May 17 00:44:34.880000 audit[4850]: USER_START pid=4850 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:34.882000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:35.163636 sshd[4850]: pam_unix(sshd:session): session closed for user core May 17 00:44:35.163000 audit[4850]: USER_END pid=4850 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:35.163000 audit[4850]: CRED_DISP pid=4850 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:35.167451 systemd[1]: sshd@9-134.199.236.151:22-147.75.109.163:53960.service: Deactivated successfully. May 17 00:44:35.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-134.199.236.151:22-147.75.109.163:53960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:35.168854 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:44:35.169698 systemd-logind[1179]: Session 10 logged out. Waiting for processes to exit. May 17 00:44:35.171186 systemd-logind[1179]: Removed session 10. May 17 00:44:40.172115 systemd[1]: Started sshd@10-134.199.236.151:22-147.75.109.163:44550.service. May 17 00:44:40.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-134.199.236.151:22-147.75.109.163:44550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.176958 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:44:40.177134 kernel: audit: type=1130 audit(1747442680.171:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-134.199.236.151:22-147.75.109.163:44550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.220000 audit[4867]: USER_ACCT pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.222573 sshd[4867]: Accepted publickey for core from 147.75.109.163 port 44550 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:40.225318 kernel: audit: type=1101 audit(1747442680.220:1446): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.225000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.227943 sshd[4867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:40.230337 kernel: audit: type=1103 audit(1747442680.225:1447): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.234354 kernel: audit: type=1006 audit(1747442680.226:1448): pid=4867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:44:40.234829 kernel: audit: type=1300 audit(1747442680.226:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda275d720 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:40.226000 audit[4867]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda275d720 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:40.226000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:40.240357 kernel: audit: type=1327 audit(1747442680.226:1448): proctitle=737368643A20636F7265205B707269765D May 17 00:44:40.240948 systemd[1]: Started session-11.scope. May 17 00:44:40.241431 systemd-logind[1179]: New session 11 of user core. May 17 00:44:40.246000 audit[4867]: USER_START pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.248000 audit[4869]: CRED_ACQ pid=4869 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.254527 kernel: audit: type=1105 audit(1747442680.246:1449): pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.254682 kernel: audit: type=1103 audit(1747442680.248:1450): pid=4869 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.435108 sshd[4867]: pam_unix(sshd:session): session closed for user core May 17 00:44:40.437000 audit[4867]: USER_END pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.441416 systemd[1]: Started sshd@11-134.199.236.151:22-147.75.109.163:44562.service. May 17 00:44:40.443342 kernel: audit: type=1106 audit(1747442680.437:1451): pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.442000 audit[4867]: CRED_DISP pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.447307 kernel: audit: type=1104 audit(1747442680.442:1452): pid=4867 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-134.199.236.151:22-147.75.109.163:44562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.449601 systemd[1]: sshd@10-134.199.236.151:22-147.75.109.163:44550.service: Deactivated successfully. May 17 00:44:40.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-134.199.236.151:22-147.75.109.163:44550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.451647 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:44:40.455741 systemd-logind[1179]: Session 11 logged out. Waiting for processes to exit. May 17 00:44:40.457526 systemd-logind[1179]: Removed session 11. May 17 00:44:40.502000 audit[4879]: USER_ACCT pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.504165 sshd[4879]: Accepted publickey for core from 147.75.109.163 port 44562 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:40.504000 audit[4879]: CRED_ACQ pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.504000 audit[4879]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe08cebd60 a2=3 a3=0 items=0 ppid=1 pid=4879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:40.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:40.507089 sshd[4879]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:40.513735 systemd[1]: Started session-12.scope. May 17 00:44:40.514631 systemd-logind[1179]: New session 12 of user core. May 17 00:44:40.519000 audit[4879]: USER_START pid=4879 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.521000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.750483 sshd[4879]: pam_unix(sshd:session): session closed for user core May 17 00:44:40.758622 systemd[1]: Started sshd@12-134.199.236.151:22-147.75.109.163:44564.service. May 17 00:44:40.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-134.199.236.151:22-147.75.109.163:44564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.759000 audit[4879]: USER_END pid=4879 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.760000 audit[4879]: CRED_DISP pid=4879 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.767685 systemd-logind[1179]: Session 12 logged out. Waiting for processes to exit. May 17 00:44:40.769972 systemd[1]: sshd@11-134.199.236.151:22-147.75.109.163:44562.service: Deactivated successfully. May 17 00:44:40.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-134.199.236.151:22-147.75.109.163:44562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:40.771825 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:44:40.772933 systemd-logind[1179]: Removed session 12. May 17 00:44:40.829000 audit[4890]: USER_ACCT pid=4890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.831719 sshd[4890]: Accepted publickey for core from 147.75.109.163 port 44564 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:40.831000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.831000 audit[4890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9ff0180 a2=3 a3=0 items=0 ppid=1 pid=4890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:40.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:40.833689 sshd[4890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:40.842513 systemd-logind[1179]: New session 13 of user core. May 17 00:44:40.843777 systemd[1]: Started session-13.scope. May 17 00:44:40.851000 audit[4890]: USER_START pid=4890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:40.854000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:41.046638 sshd[4890]: pam_unix(sshd:session): session closed for user core May 17 00:44:41.046000 audit[4890]: USER_END pid=4890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:41.047000 audit[4890]: CRED_DISP pid=4890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:41.051149 systemd[1]: sshd@12-134.199.236.151:22-147.75.109.163:44564.service: Deactivated successfully. May 17 00:44:41.052015 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:44:41.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-134.199.236.151:22-147.75.109.163:44564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:41.053052 systemd-logind[1179]: Session 13 logged out. Waiting for processes to exit. May 17 00:44:41.054208 systemd-logind[1179]: Removed session 13. May 17 00:44:45.151258 kubelet[1930]: E0517 00:44:45.151206 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:44:45.157755 env[1190]: time="2025-05-17T00:44:45.157703594Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:44:45.383844 env[1190]: time="2025-05-17T00:44:45.383566620Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:45.385849 env[1190]: time="2025-05-17T00:44:45.385674584Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:45.386127 kubelet[1930]: E0517 00:44:45.386058 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:45.386274 kubelet[1930]: E0517 00:44:45.386142 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:45.386395 kubelet[1930]: E0517 00:44:45.386336 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c2812b6c12664ddd8ce606719b2bc444,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:45.394963 env[1190]: time="2025-05-17T00:44:45.394617151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:44:45.613256 env[1190]: time="2025-05-17T00:44:45.613156162Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:45.614224 env[1190]: time="2025-05-17T00:44:45.614145753Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:45.614659 kubelet[1930]: E0517 00:44:45.614603 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:45.614866 kubelet[1930]: E0517 00:44:45.614841 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:44:45.615137 kubelet[1930]: E0517 00:44:45.615094 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:45.616941 kubelet[1930]: E0517 00:44:45.616852 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:44:46.060771 systemd[1]: Started sshd@13-134.199.236.151:22-147.75.109.163:44580.service. May 17 00:44:46.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-134.199.236.151:22-147.75.109.163:44580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:46.063142 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:44:46.063282 kernel: audit: type=1130 audit(1747442686.061:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-134.199.236.151:22-147.75.109.163:44580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:46.194000 audit[4913]: USER_ACCT pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.195168 sshd[4913]: Accepted publickey for core from 147.75.109.163 port 44580 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:46.199346 kernel: audit: type=1101 audit(1747442686.194:1473): pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.200000 audit[4913]: CRED_ACQ pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.207591 kernel: audit: type=1103 audit(1747442686.200:1474): pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.212183 kernel: audit: type=1006 audit(1747442686.201:1475): pid=4913 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:44:46.212341 kernel: audit: type=1300 audit(1747442686.201:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc64518050 a2=3 a3=0 items=0 ppid=1 pid=4913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:46.201000 audit[4913]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc64518050 a2=3 a3=0 items=0 ppid=1 pid=4913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:46.201000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:46.215330 kernel: audit: type=1327 audit(1747442686.201:1475): proctitle=737368643A20636F7265205B707269765D May 17 00:44:46.217020 sshd[4913]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:46.229340 systemd-logind[1179]: New session 14 of user core. May 17 00:44:46.230402 systemd[1]: Started session-14.scope. May 17 00:44:46.239000 audit[4913]: USER_START pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.244338 kernel: audit: type=1105 audit(1747442686.239:1476): pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.246000 audit[4916]: CRED_ACQ pid=4916 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.252389 kernel: audit: type=1103 audit(1747442686.246:1477): pid=4916 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.910571 sshd[4913]: pam_unix(sshd:session): session closed for user core May 17 00:44:46.912000 audit[4913]: USER_END pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.917218 systemd[1]: sshd@13-134.199.236.151:22-147.75.109.163:44580.service: Deactivated successfully. May 17 00:44:46.917517 kernel: audit: type=1106 audit(1747442686.912:1478): pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.919055 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:44:46.912000 audit[4913]: CRED_DISP pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.924313 kernel: audit: type=1104 audit(1747442686.912:1479): pid=4913 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:46.924265 systemd-logind[1179]: Session 14 logged out. Waiting for processes to exit. May 17 00:44:46.926464 systemd-logind[1179]: Removed session 14. May 17 00:44:46.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-134.199.236.151:22-147.75.109.163:44580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:47.163459 kubelet[1930]: E0517 00:44:47.160148 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:48.138955 kubelet[1930]: E0517 00:44:48.138893 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:48.139369 kubelet[1930]: E0517 00:44:48.139329 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:51.918632 systemd[1]: Started sshd@14-134.199.236.151:22-147.75.109.163:53516.service. May 17 00:44:51.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-134.199.236.151:22-147.75.109.163:53516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:51.920130 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:44:51.920206 kernel: audit: type=1130 audit(1747442691.918:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-134.199.236.151:22-147.75.109.163:53516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:51.968000 audit[4948]: USER_ACCT pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:51.972743 sshd[4948]: Accepted publickey for core from 147.75.109.163 port 53516 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:51.973447 kernel: audit: type=1101 audit(1747442691.968:1482): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:51.973504 kernel: audit: type=1103 audit(1747442691.972:1483): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:51.972000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:51.974177 sshd[4948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:51.979171 kernel: audit: type=1006 audit(1747442691.973:1484): pid=4948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:44:51.979219 kernel: audit: type=1300 audit(1747442691.973:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff55289440 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:51.973000 audit[4948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff55289440 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:51.985410 kernel: audit: type=1327 audit(1747442691.973:1484): proctitle=737368643A20636F7265205B707269765D May 17 00:44:51.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:51.987032 systemd-logind[1179]: New session 15 of user core. May 17 00:44:51.987412 systemd[1]: Started session-15.scope. May 17 00:44:52.000000 audit[4948]: USER_START pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.003000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.010520 kernel: audit: type=1105 audit(1747442692.000:1485): pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.010613 kernel: audit: type=1103 audit(1747442692.003:1486): pid=4950 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.158550 sshd[4948]: pam_unix(sshd:session): session closed for user core May 17 00:44:52.159000 audit[4948]: USER_END pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.162667 systemd-logind[1179]: Session 15 logged out. Waiting for processes to exit. May 17 00:44:52.160000 audit[4948]: CRED_DISP pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.164755 systemd[1]: sshd@14-134.199.236.151:22-147.75.109.163:53516.service: Deactivated successfully. May 17 00:44:52.165673 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:44:52.167079 kernel: audit: type=1106 audit(1747442692.159:1487): pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.167177 kernel: audit: type=1104 audit(1747442692.160:1488): pid=4948 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:52.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-134.199.236.151:22-147.75.109.163:53516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:52.168459 systemd-logind[1179]: Removed session 15. May 17 00:44:57.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-134.199.236.151:22-147.75.109.163:53522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:57.165759 systemd[1]: Started sshd@15-134.199.236.151:22-147.75.109.163:53522.service. May 17 00:44:57.170320 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:44:57.170852 kernel: audit: type=1130 audit(1747442697.164:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-134.199.236.151:22-147.75.109.163:53522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:57.220000 audit[4960]: USER_ACCT pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.222101 sshd[4960]: Accepted publickey for core from 147.75.109.163 port 53522 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:57.231322 kernel: audit: type=1101 audit(1747442697.220:1491): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.231678 kernel: audit: type=1103 audit(1747442697.229:1492): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.229000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.232894 sshd[4960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:57.236561 kernel: audit: type=1006 audit(1747442697.231:1493): pid=4960 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:44:57.231000 audit[4960]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f557ed0 a2=3 a3=0 items=0 ppid=1 pid=4960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:57.241275 kernel: audit: type=1300 audit(1747442697.231:1493): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f557ed0 a2=3 a3=0 items=0 ppid=1 pid=4960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:57.242401 kernel: audit: type=1327 audit(1747442697.231:1493): proctitle=737368643A20636F7265205B707269765D May 17 00:44:57.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:57.247107 systemd-logind[1179]: New session 16 of user core. May 17 00:44:57.247551 systemd[1]: Started session-16.scope. May 17 00:44:57.252000 audit[4960]: USER_START pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.257389 kernel: audit: type=1105 audit(1747442697.252:1494): pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.257000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.264332 kernel: audit: type=1103 audit(1747442697.257:1495): pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.398243 sshd[4960]: pam_unix(sshd:session): session closed for user core May 17 00:44:57.398000 audit[4960]: USER_END pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.400000 audit[4960]: CRED_DISP pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.404474 systemd[1]: sshd@15-134.199.236.151:22-147.75.109.163:53522.service: Deactivated successfully. May 17 00:44:57.405434 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:44:57.406691 kernel: audit: type=1106 audit(1747442697.398:1496): pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.406762 kernel: audit: type=1104 audit(1747442697.400:1497): pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:57.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-134.199.236.151:22-147.75.109.163:53522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:57.407609 systemd-logind[1179]: Session 16 logged out. Waiting for processes to exit. May 17 00:44:57.409001 systemd-logind[1179]: Removed session 16. May 17 00:44:59.141470 env[1190]: time="2025-05-17T00:44:59.141421727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:44:59.411110 env[1190]: time="2025-05-17T00:44:59.410945362Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:59.411842 env[1190]: time="2025-05-17T00:44:59.411782686Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:59.412118 kubelet[1930]: E0517 00:44:59.412080 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:59.412516 kubelet[1930]: E0517 00:44:59.412490 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:59.412768 kubelet[1930]: E0517 00:44:59.412727 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4g27k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-f6rvs_calico-system(e451f6f0-3693-459e-a9c7-dc41b8be0c59): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:59.414084 kubelet[1930]: E0517 00:44:59.414032 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:45:00.141547 kubelet[1930]: E0517 00:45:00.141486 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:45:01.140063 kubelet[1930]: E0517 00:45:01.140000 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:45:02.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-134.199.236.151:22-147.75.109.163:43822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:02.413005 systemd[1]: Started sshd@16-134.199.236.151:22-147.75.109.163:43822.service. May 17 00:45:02.414347 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:45:02.414400 kernel: audit: type=1130 audit(1747442702.411:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-134.199.236.151:22-147.75.109.163:43822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:02.486000 audit[4985]: USER_ACCT pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.489893 sshd[4985]: Accepted publickey for core from 147.75.109.163 port 43822 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:02.491000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.493634 sshd[4985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:02.497031 kernel: audit: type=1101 audit(1747442702.486:1500): pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.497982 kernel: audit: type=1103 audit(1747442702.491:1501): pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.491000 audit[4985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94b750b0 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:02.504525 kernel: audit: type=1006 audit(1747442702.491:1502): pid=4985 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:45:02.504839 kernel: audit: type=1300 audit(1747442702.491:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94b750b0 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:02.505617 kernel: audit: type=1327 audit(1747442702.491:1502): proctitle=737368643A20636F7265205B707269765D May 17 00:45:02.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:02.509912 systemd-logind[1179]: New session 17 of user core. May 17 00:45:02.512119 systemd[1]: Started session-17.scope. May 17 00:45:02.524000 audit[4985]: USER_START pid=4985 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.531360 kernel: audit: type=1105 audit(1747442702.524:1503): pid=4985 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.533000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.540337 kernel: audit: type=1103 audit(1747442702.533:1504): pid=4998 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.931923 sshd[4985]: pam_unix(sshd:session): session closed for user core May 17 00:45:02.942000 audit[4985]: USER_END pid=4985 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.948927 kernel: audit: type=1106 audit(1747442702.942:1505): pid=4985 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.946119 systemd[1]: Started sshd@17-134.199.236.151:22-147.75.109.163:43828.service. May 17 00:45:02.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-134.199.236.151:22-147.75.109.163:43828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:02.955762 kernel: audit: type=1130 audit(1747442702.949:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-134.199.236.151:22-147.75.109.163:43828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:02.953000 audit[4985]: CRED_DISP pid=4985 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:02.960277 systemd[1]: sshd@16-134.199.236.151:22-147.75.109.163:43822.service: Deactivated successfully. May 17 00:45:02.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-134.199.236.151:22-147.75.109.163:43822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:02.961898 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:45:02.964047 systemd-logind[1179]: Session 17 logged out. Waiting for processes to exit. May 17 00:45:02.968455 systemd-logind[1179]: Removed session 17. May 17 00:45:03.017000 audit[5009]: USER_ACCT pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.019869 sshd[5009]: Accepted publickey for core from 147.75.109.163 port 43828 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:03.020000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.021000 audit[5009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78828d70 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:03.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:03.023909 sshd[5009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:03.036391 systemd-logind[1179]: New session 18 of user core. May 17 00:45:03.037772 systemd[1]: Started session-18.scope. May 17 00:45:03.048000 audit[5009]: USER_START pid=5009 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.051000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.517986 sshd[5009]: pam_unix(sshd:session): session closed for user core May 17 00:45:03.524000 audit[5009]: USER_END pid=5009 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.524000 audit[5009]: CRED_DISP pid=5009 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-134.199.236.151:22-147.75.109.163:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:03.526109 systemd[1]: Started sshd@18-134.199.236.151:22-147.75.109.163:43844.service. May 17 00:45:03.530228 systemd[1]: sshd@17-134.199.236.151:22-147.75.109.163:43828.service: Deactivated successfully. May 17 00:45:03.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-134.199.236.151:22-147.75.109.163:43828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:03.533234 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:45:03.534893 systemd-logind[1179]: Session 18 logged out. Waiting for processes to exit. May 17 00:45:03.536209 systemd-logind[1179]: Removed session 18. May 17 00:45:03.588000 audit[5019]: USER_ACCT pid=5019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.590282 sshd[5019]: Accepted publickey for core from 147.75.109.163 port 43844 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:03.590000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.591000 audit[5019]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd344edf40 a2=3 a3=0 items=0 ppid=1 pid=5019 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:03.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:03.594031 sshd[5019]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:03.601556 systemd-logind[1179]: New session 19 of user core. May 17 00:45:03.602468 systemd[1]: Started session-19.scope. May 17 00:45:03.609000 audit[5019]: USER_START pid=5019 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:03.612000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.146242 kubelet[1930]: E0517 00:45:04.146182 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:45:04.766000 audit[5032]: NETFILTER_CFG table=filter:132 family=2 entries=24 op=nft_register_rule pid=5032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:04.766000 audit[5032]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff655d67f0 a2=0 a3=7fff655d67dc items=0 ppid=2028 pid=5032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:04.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:04.773000 audit[5032]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:04.773000 audit[5032]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff655d67f0 a2=0 a3=0 items=0 ppid=2028 pid=5032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:04.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:04.801995 sshd[5019]: pam_unix(sshd:session): session closed for user core May 17 00:45:04.807000 audit[5019]: USER_END pid=5019 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.807000 audit[5019]: CRED_DISP pid=5019 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.811886 systemd[1]: sshd@18-134.199.236.151:22-147.75.109.163:43844.service: Deactivated successfully. May 17 00:45:04.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-134.199.236.151:22-147.75.109.163:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:04.814243 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:45:04.816159 systemd-logind[1179]: Session 19 logged out. Waiting for processes to exit. May 17 00:45:04.820006 systemd[1]: Started sshd@19-134.199.236.151:22-147.75.109.163:43846.service. May 17 00:45:04.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-134.199.236.151:22-147.75.109.163:43846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:04.824000 audit[5034]: NETFILTER_CFG table=filter:134 family=2 entries=36 op=nft_register_rule pid=5034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:04.824000 audit[5034]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fffe48e9dd0 a2=0 a3=7fffe48e9dbc items=0 ppid=2028 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:04.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:04.828332 systemd-logind[1179]: Removed session 19. May 17 00:45:04.830000 audit[5034]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=5034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:04.830000 audit[5034]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe48e9dd0 a2=0 a3=0 items=0 ppid=2028 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:04.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:04.894363 sshd[5037]: Accepted publickey for core from 147.75.109.163 port 43846 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:04.892000 audit[5037]: USER_ACCT pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.895000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.895000 audit[5037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe60c25150 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:04.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:04.897878 sshd[5037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:04.904754 systemd-logind[1179]: New session 20 of user core. May 17 00:45:04.905420 systemd[1]: Started session-20.scope. May 17 00:45:04.914000 audit[5037]: USER_START pid=5037 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:04.917000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.559172 sshd[5037]: pam_unix(sshd:session): session closed for user core May 17 00:45:05.560000 audit[5037]: USER_END pid=5037 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.561000 audit[5037]: CRED_DISP pid=5037 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.569632 systemd[1]: Started sshd@20-134.199.236.151:22-147.75.109.163:43862.service. May 17 00:45:05.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-134.199.236.151:22-147.75.109.163:43862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:05.574319 systemd[1]: sshd@19-134.199.236.151:22-147.75.109.163:43846.service: Deactivated successfully. May 17 00:45:05.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-134.199.236.151:22-147.75.109.163:43846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:05.576155 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:45:05.578874 systemd-logind[1179]: Session 20 logged out. Waiting for processes to exit. May 17 00:45:05.581480 systemd-logind[1179]: Removed session 20. May 17 00:45:05.629797 sshd[5047]: Accepted publickey for core from 147.75.109.163 port 43862 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:05.628000 audit[5047]: USER_ACCT pid=5047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.630000 audit[5047]: CRED_ACQ pid=5047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.630000 audit[5047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe323ca5c0 a2=3 a3=0 items=0 ppid=1 pid=5047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:05.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:05.632892 sshd[5047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:05.640879 systemd-logind[1179]: New session 21 of user core. May 17 00:45:05.640894 systemd[1]: Started session-21.scope. May 17 00:45:05.647000 audit[5047]: USER_START pid=5047 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.650000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.860494 sshd[5047]: pam_unix(sshd:session): session closed for user core May 17 00:45:05.860000 audit[5047]: USER_END pid=5047 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.861000 audit[5047]: CRED_DISP pid=5047 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:05.864950 systemd[1]: sshd@20-134.199.236.151:22-147.75.109.163:43862.service: Deactivated successfully. May 17 00:45:05.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-134.199.236.151:22-147.75.109.163:43862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:05.865886 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:45:05.866625 systemd-logind[1179]: Session 21 logged out. Waiting for processes to exit. May 17 00:45:05.867911 systemd-logind[1179]: Removed session 21. May 17 00:45:10.140629 kubelet[1930]: E0517 00:45:10.140563 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:45:10.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-134.199.236.151:22-147.75.109.163:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:10.867433 systemd[1]: Started sshd@21-134.199.236.151:22-147.75.109.163:53140.service. May 17 00:45:10.868630 kernel: kauditd_printk_skb: 57 callbacks suppressed May 17 00:45:10.868682 kernel: audit: type=1130 audit(1747442710.866:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-134.199.236.151:22-147.75.109.163:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:10.920000 audit[5061]: USER_ACCT pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.922362 sshd[5061]: Accepted publickey for core from 147.75.109.163 port 53140 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:10.926356 kernel: audit: type=1101 audit(1747442710.920:1549): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.925000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.927488 sshd[5061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:10.932947 kernel: audit: type=1103 audit(1747442710.925:1550): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.933072 kernel: audit: type=1006 audit(1747442710.925:1551): pid=5061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:45:10.925000 audit[5061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf1595360 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:10.936349 kernel: audit: type=1300 audit(1747442710.925:1551): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf1595360 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:10.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:10.939410 kernel: audit: type=1327 audit(1747442710.925:1551): proctitle=737368643A20636F7265205B707269765D May 17 00:45:10.943079 systemd[1]: Started session-22.scope. May 17 00:45:10.943706 systemd-logind[1179]: New session 22 of user core. May 17 00:45:10.949000 audit[5061]: USER_START pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.953000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.957731 kernel: audit: type=1105 audit(1747442710.949:1552): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.957873 kernel: audit: type=1103 audit(1747442710.953:1553): pid=5063 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.113311 sshd[5061]: pam_unix(sshd:session): session closed for user core May 17 00:45:11.113000 audit[5061]: USER_END pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.114000 audit[5061]: CRED_DISP pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.124166 kernel: audit: type=1106 audit(1747442711.113:1554): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.124252 kernel: audit: type=1104 audit(1747442711.114:1555): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.124266 systemd[1]: sshd@21-134.199.236.151:22-147.75.109.163:53140.service: Deactivated successfully. May 17 00:45:11.125483 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:45:11.126335 systemd-logind[1179]: Session 22 logged out. Waiting for processes to exit. May 17 00:45:11.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-134.199.236.151:22-147.75.109.163:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:11.127481 systemd-logind[1179]: Removed session 22. May 17 00:45:12.141296 kubelet[1930]: E0517 00:45:12.141221 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:45:12.351000 audit[5073]: NETFILTER_CFG table=filter:136 family=2 entries=24 op=nft_register_rule pid=5073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:12.351000 audit[5073]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff96ab2980 a2=0 a3=7fff96ab296c items=0 ppid=2028 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:12.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:12.357000 audit[5073]: NETFILTER_CFG table=nat:137 family=2 entries=106 op=nft_register_chain pid=5073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:12.357000 audit[5073]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff96ab2980 a2=0 a3=7fff96ab296c items=0 ppid=2028 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:12.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:13.960000 audit[4254]: AVC avc: denied { watch } for pid=4254 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_43_52.415271529/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c349 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c69,c349 tclass=file permissive=0 May 17 00:45:13.960000 audit[4254]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009efc60 a2=fc6 a3=0 items=0 ppid=3736 pid=4254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c349 key=(null) May 17 00:45:13.960000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:45:16.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-134.199.236.151:22-147.75.109.163:53148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:16.122129 systemd[1]: Started sshd@22-134.199.236.151:22-147.75.109.163:53148.service. May 17 00:45:16.123760 kernel: kauditd_printk_skb: 10 callbacks suppressed May 17 00:45:16.123871 kernel: audit: type=1130 audit(1747442716.121:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-134.199.236.151:22-147.75.109.163:53148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:16.185000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.186770 sshd[5075]: Accepted publickey for core from 147.75.109.163 port 53148 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:16.191433 kernel: audit: type=1101 audit(1747442716.185:1561): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.191000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.193615 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:16.199236 kernel: audit: type=1103 audit(1747442716.191:1562): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.199379 kernel: audit: type=1006 audit(1747442716.191:1563): pid=5075 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:45:16.199409 kernel: audit: type=1300 audit(1747442716.191:1563): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff46ae3820 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:16.191000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff46ae3820 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:16.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:16.206349 kernel: audit: type=1327 audit(1747442716.191:1563): proctitle=737368643A20636F7265205B707269765D May 17 00:45:16.207812 systemd[1]: Started session-23.scope. May 17 00:45:16.208268 systemd-logind[1179]: New session 23 of user core. May 17 00:45:16.213000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.219321 kernel: audit: type=1105 audit(1747442716.213:1564): pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.216000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.224315 kernel: audit: type=1103 audit(1747442716.216:1565): pid=5077 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.443012 sshd[5075]: pam_unix(sshd:session): session closed for user core May 17 00:45:16.443000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.449345 kernel: audit: type=1106 audit(1747442716.443:1566): pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.444000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.451669 systemd[1]: sshd@22-134.199.236.151:22-147.75.109.163:53148.service: Deactivated successfully. May 17 00:45:16.452594 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:45:16.454490 kernel: audit: type=1104 audit(1747442716.444:1567): pid=5075 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:16.454992 systemd-logind[1179]: Session 23 logged out. Waiting for processes to exit. May 17 00:45:16.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-134.199.236.151:22-147.75.109.163:53148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:16.456232 systemd-logind[1179]: Removed session 23. May 17 00:45:20.351000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:20.351000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033a1ce0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:20.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:20.351000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:20.351000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020c24e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:20.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:20.538660 systemd[1]: run-containerd-runc-k8s.io-a1efec9835c28e0443a301dd6c9ffa54ce0889b0c379847884062f83732ab4e3-runc.7hB5Cp.mount: Deactivated successfully. May 17 00:45:21.203000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.206012 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:45:21.206107 kernel: audit: type=1400 audit(1747442721.203:1571): avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.203000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.211927 kernel: audit: type=1400 audit(1747442721.203:1572): avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.212071 kernel: audit: type=1300 audit(1747442721.203:1571): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00f71cd80 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.203000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00f71cd80 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.203000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.228193 kernel: audit: type=1327 audit(1747442721.203:1571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.228298 kernel: audit: type=1400 audit(1747442721.203:1573): avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.228327 kernel: audit: type=1300 audit(1747442721.203:1573): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c013b7cae0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.203000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c013b7cae0 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.203000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c013c88330 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.249967 kernel: audit: type=1327 audit(1747442721.203:1573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.250141 kernel: audit: type=1300 audit(1747442721.203:1572): arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c013c88330 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.250173 kernel: audit: type=1327 audit(1747442721.203:1572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.209000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526386 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.258671 kernel: audit: type=1400 audit(1747442721.209:1574): avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526386 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.209000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c013c88360 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.244000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.244000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c013b7cc30 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.245000 audit[1808]: AVC avc: denied { watch } for pid=1808 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:21.245000 audit[1808]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00f71cf60 a2=fc6 a3=0 items=0 ppid=1652 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c954 key=(null) May 17 00:45:21.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133342E3139392E3233362E313531002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:45:21.451838 systemd[1]: Started sshd@23-134.199.236.151:22-147.75.109.163:40110.service. May 17 00:45:21.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-134.199.236.151:22-147.75.109.163:40110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:21.532000 audit[5106]: USER_ACCT pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.534048 sshd[5106]: Accepted publickey for core from 147.75.109.163 port 40110 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:21.534000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.534000 audit[5106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff980cae60 a2=3 a3=0 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:21.534000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:21.536788 sshd[5106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:21.543938 systemd[1]: Started session-24.scope. May 17 00:45:21.544361 systemd-logind[1179]: New session 24 of user core. May 17 00:45:21.550000 audit[5106]: USER_START pid=5106 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.552000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.782749 sshd[5106]: pam_unix(sshd:session): session closed for user core May 17 00:45:21.783000 audit[5106]: USER_END pid=5106 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.784000 audit[5106]: CRED_DISP pid=5106 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:21.788865 systemd-logind[1179]: Session 24 logged out. Waiting for processes to exit. May 17 00:45:21.789313 systemd[1]: sshd@23-134.199.236.151:22-147.75.109.163:40110.service: Deactivated successfully. May 17 00:45:21.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-134.199.236.151:22-147.75.109.163:40110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:21.790247 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:45:21.792422 systemd-logind[1179]: Removed session 24. May 17 00:45:21.966000 audit[4391]: AVC avc: denied { watch } for pid=4391 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_43_52.2332460528/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c349 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c91,c349 tclass=file permissive=0 May 17 00:45:21.966000 audit[4391]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d2b560 a2=fc6 a3=0 items=0 ppid=4101 pid=4391 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c349 key=(null) May 17 00:45:21.966000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:45:22.140054 kubelet[1930]: E0517 00:45:22.139905 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:45:25.522000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:25.522000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f997c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:25.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:25.524000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:25.524000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c32e0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:25.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:25.524000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:25.524000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c3300 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:25.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:25.526000 audit[1801]: AVC avc: denied { watch } for pid=1801 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:25.526000 audit[1801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c35c0 a2=fc6 a3=0 items=0 ppid=1655 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c235 key=(null) May 17 00:45:25.526000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:26.792618 systemd[1]: Started sshd@24-134.199.236.151:22-147.75.109.163:40114.service. May 17 00:45:26.797914 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:45:26.798053 kernel: audit: type=1130 audit(1747442726.792:1591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-134.199.236.151:22-147.75.109.163:40114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:26.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-134.199.236.151:22-147.75.109.163:40114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:26.916496 kernel: audit: type=1101 audit(1747442726.909:1592): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.916650 kernel: audit: type=1103 audit(1747442726.909:1593): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.909000 audit[5126]: USER_ACCT pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.909000 audit[5126]: CRED_ACQ pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.914881 sshd[5126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:26.917215 sshd[5126]: Accepted publickey for core from 147.75.109.163 port 40114 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:26.922654 kernel: audit: type=1006 audit(1747442726.909:1594): pid=5126 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:45:26.922772 kernel: audit: type=1300 audit(1747442726.909:1594): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61808af0 a2=3 a3=0 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:26.909000 audit[5126]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61808af0 a2=3 a3=0 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:26.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:26.925345 kernel: audit: type=1327 audit(1747442726.909:1594): proctitle=737368643A20636F7265205B707269765D May 17 00:45:26.928362 systemd-logind[1179]: New session 25 of user core. May 17 00:45:26.928677 systemd[1]: Started session-25.scope. May 17 00:45:26.933000 audit[5126]: USER_START pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.942331 kernel: audit: type=1105 audit(1747442726.933:1595): pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.942483 kernel: audit: type=1103 audit(1747442726.933:1596): pid=5142 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:26.933000 audit[5142]: CRED_ACQ pid=5142 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:27.141333 env[1190]: time="2025-05-17T00:45:27.141186877Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:45:27.364746 env[1190]: time="2025-05-17T00:45:27.364497047Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:45:27.366023 env[1190]: time="2025-05-17T00:45:27.365880655Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:45:27.368307 kubelet[1930]: E0517 00:45:27.368186 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:45:27.370943 kubelet[1930]: E0517 00:45:27.370871 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:45:27.373034 kubelet[1930]: E0517 00:45:27.372953 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c2812b6c12664ddd8ce606719b2bc444,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:45:27.375592 env[1190]: time="2025-05-17T00:45:27.375545034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:45:27.432819 sshd[5126]: pam_unix(sshd:session): session closed for user core May 17 00:45:27.435000 audit[5126]: USER_END pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:27.444005 kernel: audit: type=1106 audit(1747442727.435:1597): pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:27.444404 kernel: audit: type=1104 audit(1747442727.435:1598): pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:27.435000 audit[5126]: CRED_DISP pid=5126 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:27.442346 systemd[1]: sshd@24-134.199.236.151:22-147.75.109.163:40114.service: Deactivated successfully. May 17 00:45:27.443546 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:45:27.443690 systemd-logind[1179]: Session 25 logged out. Waiting for processes to exit. May 17 00:45:27.445371 systemd-logind[1179]: Removed session 25. May 17 00:45:27.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-134.199.236.151:22-147.75.109.163:40114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:27.595706 env[1190]: time="2025-05-17T00:45:27.595413014Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:45:27.596421 env[1190]: time="2025-05-17T00:45:27.596270923Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:45:27.596629 kubelet[1930]: E0517 00:45:27.596570 1930 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:45:27.596704 kubelet[1930]: E0517 00:45:27.596642 1930 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:45:27.596844 kubelet[1930]: E0517 00:45:27.596795 1930 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-pv9tm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d7c97c5f7-vrsb5_calico-system(4d8c4277-da20-438f-8d02-ea4cd9187785): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:45:27.601419 kubelet[1930]: E0517 00:45:27.598474 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785" May 17 00:45:30.139039 kubelet[1930]: E0517 00:45:30.138995 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:45:31.140918 kubelet[1930]: E0517 00:45:31.140855 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:45:32.412738 systemd[1]: run-containerd-runc-k8s.io-d565a18e86f91539efb095dfe8957ab01d779f775c146a9b17b73c86f49aa8e1-runc.8MVtH2.mount: Deactivated successfully. May 17 00:45:32.442017 systemd[1]: Started sshd@25-134.199.236.151:22-147.75.109.163:54364.service. May 17 00:45:32.447202 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:45:32.447322 kernel: audit: type=1130 audit(1747442732.440:1600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-134.199.236.151:22-147.75.109.163:54364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:32.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-134.199.236.151:22-147.75.109.163:54364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:32.515000 audit[5174]: USER_ACCT pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.521420 kernel: audit: type=1101 audit(1747442732.515:1601): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.521478 sshd[5174]: Accepted publickey for core from 147.75.109.163 port 54364 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:32.520000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.522859 sshd[5174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:32.526436 kernel: audit: type=1103 audit(1747442732.520:1602): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.531696 kernel: audit: type=1006 audit(1747442732.520:1603): pid=5174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:45:32.520000 audit[5174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb291010 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:32.539415 kernel: audit: type=1300 audit(1747442732.520:1603): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb291010 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:32.537272 systemd[1]: Started session-26.scope. May 17 00:45:32.538597 systemd-logind[1179]: New session 26 of user core. May 17 00:45:32.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:32.542361 kernel: audit: type=1327 audit(1747442732.520:1603): proctitle=737368643A20636F7265205B707269765D May 17 00:45:32.547000 audit[5174]: USER_START pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.552353 kernel: audit: type=1105 audit(1747442732.547:1604): pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.551000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.557326 kernel: audit: type=1103 audit(1747442732.551:1605): pid=5177 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.968553 sshd[5174]: pam_unix(sshd:session): session closed for user core May 17 00:45:32.970000 audit[5174]: USER_END pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.974750 systemd[1]: sshd@25-134.199.236.151:22-147.75.109.163:54364.service: Deactivated successfully. May 17 00:45:32.982712 kernel: audit: type=1106 audit(1747442732.970:1606): pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.982879 kernel: audit: type=1104 audit(1747442732.970:1607): pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.970000 audit[5174]: CRED_DISP pid=5174 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:32.975673 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:45:32.977239 systemd-logind[1179]: Session 26 logged out. Waiting for processes to exit. May 17 00:45:32.983444 systemd-logind[1179]: Removed session 26. May 17 00:45:32.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-134.199.236.151:22-147.75.109.163:54364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:35.155055 kubelet[1930]: E0517 00:45:35.155000 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-f6rvs" podUID="e451f6f0-3693-459e-a9c7-dc41b8be0c59" May 17 00:45:37.974482 systemd[1]: Started sshd@26-134.199.236.151:22-147.75.109.163:54372.service. May 17 00:45:37.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-134.199.236.151:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:37.976483 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:45:37.976524 kernel: audit: type=1130 audit(1747442737.975:1609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-134.199.236.151:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:38.043000 audit[5192]: USER_ACCT pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.046758 sshd[5192]: Accepted publickey for core from 147.75.109.163 port 54372 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:45:38.047316 kernel: audit: type=1101 audit(1747442738.043:1610): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.048000 audit[5192]: CRED_ACQ pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.054422 kernel: audit: type=1103 audit(1747442738.048:1611): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.054839 kernel: audit: type=1006 audit(1747442738.051:1612): pid=5192 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:45:38.054896 kernel: audit: type=1300 audit(1747442738.051:1612): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcffc6f860 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:38.051000 audit[5192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcffc6f860 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:38.060622 kernel: audit: type=1327 audit(1747442738.051:1612): proctitle=737368643A20636F7265205B707269765D May 17 00:45:38.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:38.058642 sshd[5192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:38.066139 systemd[1]: Started session-27.scope. May 17 00:45:38.067351 systemd-logind[1179]: New session 27 of user core. May 17 00:45:38.073000 audit[5192]: USER_START pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.077410 kernel: audit: type=1105 audit(1747442738.073:1613): pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.077000 audit[5194]: CRED_ACQ pid=5194 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.081705 kernel: audit: type=1103 audit(1747442738.077:1614): pid=5194 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.326960 sshd[5192]: pam_unix(sshd:session): session closed for user core May 17 00:45:38.328000 audit[5192]: USER_END pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.331067 systemd[1]: sshd@26-134.199.236.151:22-147.75.109.163:54372.service: Deactivated successfully. May 17 00:45:38.328000 audit[5192]: CRED_DISP pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.335752 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:45:38.337921 kernel: audit: type=1106 audit(1747442738.328:1615): pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.338022 kernel: audit: type=1104 audit(1747442738.328:1616): pid=5192 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:38.338172 systemd-logind[1179]: Session 27 logged out. Waiting for processes to exit. May 17 00:45:38.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-134.199.236.151:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:38.339782 systemd-logind[1179]: Removed session 27. May 17 00:45:39.141231 kubelet[1930]: E0517 00:45:39.141181 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-d7c97c5f7-vrsb5" podUID="4d8c4277-da20-438f-8d02-ea4cd9187785"