May 17 00:41:26.009837 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:41:26.009872 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:41:26.009891 kernel: BIOS-provided physical RAM map: May 17 00:41:26.009902 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:41:26.009913 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:41:26.009924 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:41:26.009937 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 17 00:41:26.009948 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 17 00:41:26.009963 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:41:26.009974 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:41:26.009985 kernel: NX (Execute Disable) protection: active May 17 00:41:26.009996 kernel: SMBIOS 2.8 present. May 17 00:41:26.010007 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 17 00:41:26.010019 kernel: Hypervisor detected: KVM May 17 00:41:26.010033 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:41:26.010049 kernel: kvm-clock: cpu 0, msr 3919a001, primary cpu clock May 17 00:41:26.010061 kernel: kvm-clock: using sched offset of 3881871228 cycles May 17 00:41:26.010074 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:41:26.010091 kernel: tsc: Detected 2494.136 MHz processor May 17 00:41:26.010103 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:41:26.010116 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:41:26.010129 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 17 00:41:26.010141 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:41:26.010157 kernel: ACPI: Early table checksum verification disabled May 17 00:41:26.010169 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 17 00:41:26.010181 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010194 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010206 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010218 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 17 00:41:26.010231 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010243 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010256 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010271 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:41:26.010283 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 17 00:41:26.010296 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 17 00:41:26.010308 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 17 00:41:26.010321 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 17 00:41:26.010333 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 17 00:41:26.010345 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 17 00:41:26.010358 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 17 00:41:26.010379 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:41:26.010392 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:41:26.010405 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:41:26.010419 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:41:26.010432 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 17 00:41:26.010446 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 17 00:41:26.010462 kernel: Zone ranges: May 17 00:41:26.010475 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:41:26.010488 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 17 00:41:26.010502 kernel: Normal empty May 17 00:41:26.010515 kernel: Movable zone start for each node May 17 00:41:26.010528 kernel: Early memory node ranges May 17 00:41:26.010541 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:41:26.010555 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 17 00:41:26.010568 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 17 00:41:26.010584 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:41:26.010600 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:41:26.010614 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 17 00:41:26.010627 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:41:26.010640 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:41:26.010654 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:41:26.010667 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:41:26.010680 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:41:26.010694 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:41:26.010710 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:41:26.010738 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:41:26.010752 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:41:26.010765 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:41:26.010779 kernel: TSC deadline timer available May 17 00:41:26.010792 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:41:26.010805 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 17 00:41:26.010818 kernel: Booting paravirtualized kernel on KVM May 17 00:41:26.010832 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:41:26.010849 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:41:26.010863 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:41:26.010876 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:41:26.010889 kernel: pcpu-alloc: [0] 0 1 May 17 00:41:26.010903 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 17 00:41:26.010916 kernel: kvm-guest: PV spinlocks disabled, no host support May 17 00:41:26.010929 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 17 00:41:26.010943 kernel: Policy zone: DMA32 May 17 00:41:26.010957 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:41:26.010975 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:41:26.010988 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:41:26.011002 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:41:26.011015 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:41:26.011029 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 123076K reserved, 0K cma-reserved) May 17 00:41:26.011043 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:41:26.011056 kernel: Kernel/User page tables isolation: enabled May 17 00:41:26.011070 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:41:26.011087 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:41:26.011100 kernel: rcu: Hierarchical RCU implementation. May 17 00:41:26.011115 kernel: rcu: RCU event tracing is enabled. May 17 00:41:26.011128 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:41:26.011142 kernel: Rude variant of Tasks RCU enabled. May 17 00:41:26.011156 kernel: Tracing variant of Tasks RCU enabled. May 17 00:41:26.011169 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:41:26.011182 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:41:26.011196 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:41:26.011212 kernel: random: crng init done May 17 00:41:26.011225 kernel: Console: colour VGA+ 80x25 May 17 00:41:26.011238 kernel: printk: console [tty0] enabled May 17 00:41:26.011252 kernel: printk: console [ttyS0] enabled May 17 00:41:26.011265 kernel: ACPI: Core revision 20210730 May 17 00:41:26.011279 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:41:26.011293 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:41:26.011306 kernel: x2apic enabled May 17 00:41:26.011320 kernel: Switched APIC routing to physical x2apic. May 17 00:41:26.011333 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:41:26.011350 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39654230, max_idle_ns: 440795207432 ns May 17 00:41:26.011364 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494136) May 17 00:41:26.011383 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 17 00:41:26.011397 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 17 00:41:26.011410 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:41:26.011424 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:41:26.011437 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:41:26.011451 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 17 00:41:26.011469 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:41:26.011494 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:41:26.011509 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:41:26.011526 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:41:26.011540 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:41:26.011554 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:41:26.011568 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:41:26.011582 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:41:26.011596 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:41:26.011611 kernel: Freeing SMP alternatives memory: 32K May 17 00:41:26.011628 kernel: pid_max: default: 32768 minimum: 301 May 17 00:41:26.011642 kernel: LSM: Security Framework initializing May 17 00:41:26.011656 kernel: SELinux: Initializing. May 17 00:41:26.011670 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:41:26.011685 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:41:26.011699 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 17 00:41:26.011713 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 17 00:41:26.022826 kernel: signal: max sigframe size: 1776 May 17 00:41:26.022842 kernel: rcu: Hierarchical SRCU implementation. May 17 00:41:26.022856 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:41:26.022892 kernel: smp: Bringing up secondary CPUs ... May 17 00:41:26.022907 kernel: x86: Booting SMP configuration: May 17 00:41:26.022918 kernel: .... node #0, CPUs: #1 May 17 00:41:26.022930 kernel: kvm-clock: cpu 1, msr 3919a041, secondary cpu clock May 17 00:41:26.022944 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 17 00:41:26.022957 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:41:26.022976 kernel: smpboot: Max logical packages: 1 May 17 00:41:26.022990 kernel: smpboot: Total of 2 processors activated (9976.54 BogoMIPS) May 17 00:41:26.023004 kernel: devtmpfs: initialized May 17 00:41:26.023016 kernel: x86/mm: Memory block size: 128MB May 17 00:41:26.023029 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:41:26.023042 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:41:26.023057 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:41:26.023072 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:41:26.023084 kernel: audit: initializing netlink subsys (disabled) May 17 00:41:26.023100 kernel: audit: type=2000 audit(1747442484.302:1): state=initialized audit_enabled=0 res=1 May 17 00:41:26.023115 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:41:26.023127 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:41:26.023139 kernel: cpuidle: using governor menu May 17 00:41:26.023159 kernel: ACPI: bus type PCI registered May 17 00:41:26.023173 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:41:26.023191 kernel: dca service started, version 1.12.1 May 17 00:41:26.023203 kernel: PCI: Using configuration type 1 for base access May 17 00:41:26.023215 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:41:26.023233 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:41:26.023245 kernel: ACPI: Added _OSI(Module Device) May 17 00:41:26.023257 kernel: ACPI: Added _OSI(Processor Device) May 17 00:41:26.023269 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:41:26.023281 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:41:26.023293 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:41:26.023307 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:41:26.023319 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:41:26.023333 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:41:26.023350 kernel: ACPI: Interpreter enabled May 17 00:41:26.023364 kernel: ACPI: PM: (supports S0 S5) May 17 00:41:26.023376 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:41:26.023389 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:41:26.023402 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:41:26.023417 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:41:26.023693 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:41:26.023955 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:41:26.023987 kernel: acpiphp: Slot [3] registered May 17 00:41:26.024002 kernel: acpiphp: Slot [4] registered May 17 00:41:26.024015 kernel: acpiphp: Slot [5] registered May 17 00:41:26.024029 kernel: acpiphp: Slot [6] registered May 17 00:41:26.024042 kernel: acpiphp: Slot [7] registered May 17 00:41:26.024055 kernel: acpiphp: Slot [8] registered May 17 00:41:26.024068 kernel: acpiphp: Slot [9] registered May 17 00:41:26.024081 kernel: acpiphp: Slot [10] registered May 17 00:41:26.024094 kernel: acpiphp: Slot [11] registered May 17 00:41:26.024111 kernel: acpiphp: Slot [12] registered May 17 00:41:26.024125 kernel: acpiphp: Slot [13] registered May 17 00:41:26.024139 kernel: acpiphp: Slot [14] registered May 17 00:41:26.024152 kernel: acpiphp: Slot [15] registered May 17 00:41:26.024165 kernel: acpiphp: Slot [16] registered May 17 00:41:26.024178 kernel: acpiphp: Slot [17] registered May 17 00:41:26.024191 kernel: acpiphp: Slot [18] registered May 17 00:41:26.024204 kernel: acpiphp: Slot [19] registered May 17 00:41:26.024218 kernel: acpiphp: Slot [20] registered May 17 00:41:26.024234 kernel: acpiphp: Slot [21] registered May 17 00:41:26.024247 kernel: acpiphp: Slot [22] registered May 17 00:41:26.024260 kernel: acpiphp: Slot [23] registered May 17 00:41:26.024273 kernel: acpiphp: Slot [24] registered May 17 00:41:26.024287 kernel: acpiphp: Slot [25] registered May 17 00:41:26.024299 kernel: acpiphp: Slot [26] registered May 17 00:41:26.024313 kernel: acpiphp: Slot [27] registered May 17 00:41:26.024326 kernel: acpiphp: Slot [28] registered May 17 00:41:26.024339 kernel: acpiphp: Slot [29] registered May 17 00:41:26.024352 kernel: acpiphp: Slot [30] registered May 17 00:41:26.024369 kernel: acpiphp: Slot [31] registered May 17 00:41:26.024382 kernel: PCI host bridge to bus 0000:00 May 17 00:41:26.024525 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:41:26.024639 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:41:26.024768 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:41:26.024884 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:41:26.025000 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 17 00:41:26.025122 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:41:26.025279 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:41:26.025431 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:41:26.025617 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 17 00:41:26.025782 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 17 00:41:26.025925 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:41:26.026056 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:41:26.026181 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:41:26.026304 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:41:26.026438 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 17 00:41:26.026563 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 17 00:41:26.026714 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:41:26.026855 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 17 00:41:26.026982 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 17 00:41:26.027122 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 17 00:41:26.027249 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 17 00:41:26.027378 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 17 00:41:26.027501 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 17 00:41:26.027632 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 17 00:41:26.027765 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:41:26.027926 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 17 00:41:26.028052 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 17 00:41:26.028174 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 17 00:41:26.028299 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 17 00:41:26.028437 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:41:26.028559 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 17 00:41:26.028686 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 17 00:41:26.028834 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 17 00:41:26.028986 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 17 00:41:26.029120 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 17 00:41:26.029259 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 17 00:41:26.029391 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 17 00:41:26.029541 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 17 00:41:26.029685 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:41:26.032139 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 17 00:41:26.032299 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 17 00:41:26.032448 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 17 00:41:26.032574 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 17 00:41:26.032698 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 17 00:41:26.032840 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 17 00:41:26.032996 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 17 00:41:26.033132 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 17 00:41:26.033266 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 17 00:41:26.033285 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:41:26.033300 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:41:26.033315 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:41:26.033331 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:41:26.033350 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:41:26.033365 kernel: iommu: Default domain type: Translated May 17 00:41:26.033380 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:41:26.033515 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 17 00:41:26.033649 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:41:26.033813 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 17 00:41:26.033835 kernel: vgaarb: loaded May 17 00:41:26.033849 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:41:26.033864 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:41:26.033883 kernel: PTP clock support registered May 17 00:41:26.033897 kernel: PCI: Using ACPI for IRQ routing May 17 00:41:26.033911 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:41:26.033924 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:41:26.033938 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 17 00:41:26.033952 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:41:26.033966 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:41:26.033980 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:41:26.033994 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:41:26.034011 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:41:26.034025 kernel: pnp: PnP ACPI init May 17 00:41:26.034038 kernel: pnp: PnP ACPI: found 4 devices May 17 00:41:26.034052 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:41:26.034066 kernel: NET: Registered PF_INET protocol family May 17 00:41:26.034080 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:41:26.034094 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:41:26.034108 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:41:26.034124 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:41:26.034138 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:41:26.034151 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:41:26.034165 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:41:26.034178 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:41:26.034192 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:41:26.034205 kernel: NET: Registered PF_XDP protocol family May 17 00:41:26.034327 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:41:26.034440 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:41:26.034554 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:41:26.034664 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:41:26.034784 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 17 00:41:26.034916 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 17 00:41:26.035045 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:41:26.035170 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:41:26.035189 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:41:26.035314 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 31796 usecs May 17 00:41:26.035335 kernel: PCI: CLS 0 bytes, default 64 May 17 00:41:26.035349 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:41:26.035363 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39654230, max_idle_ns: 440795207432 ns May 17 00:41:26.035377 kernel: Initialise system trusted keyrings May 17 00:41:26.035391 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:41:26.035404 kernel: Key type asymmetric registered May 17 00:41:26.035417 kernel: Asymmetric key parser 'x509' registered May 17 00:41:26.035431 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:41:26.035444 kernel: io scheduler mq-deadline registered May 17 00:41:26.035461 kernel: io scheduler kyber registered May 17 00:41:26.035474 kernel: io scheduler bfq registered May 17 00:41:26.035489 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:41:26.035503 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 17 00:41:26.035517 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:41:26.035530 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:41:26.035544 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:41:26.035558 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:41:26.035572 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:41:26.035588 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:41:26.035602 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:41:26.035615 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:41:26.035793 kernel: rtc_cmos 00:03: RTC can wake from S4 May 17 00:41:26.035925 kernel: rtc_cmos 00:03: registered as rtc0 May 17 00:41:26.036089 kernel: rtc_cmos 00:03: setting system clock to 2025-05-17T00:41:25 UTC (1747442485) May 17 00:41:26.036205 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 17 00:41:26.036227 kernel: intel_pstate: CPU model not supported May 17 00:41:26.036241 kernel: NET: Registered PF_INET6 protocol family May 17 00:41:26.036255 kernel: Segment Routing with IPv6 May 17 00:41:26.036268 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:41:26.036281 kernel: NET: Registered PF_PACKET protocol family May 17 00:41:26.036295 kernel: Key type dns_resolver registered May 17 00:41:26.036308 kernel: IPI shorthand broadcast: enabled May 17 00:41:26.036321 kernel: sched_clock: Marking stable (632002613, 93030426)->(840817162, -115784123) May 17 00:41:26.036334 kernel: registered taskstats version 1 May 17 00:41:26.036348 kernel: Loading compiled-in X.509 certificates May 17 00:41:26.036364 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:41:26.036378 kernel: Key type .fscrypt registered May 17 00:41:26.036390 kernel: Key type fscrypt-provisioning registered May 17 00:41:26.036404 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:41:26.036418 kernel: ima: Allocated hash algorithm: sha1 May 17 00:41:26.036430 kernel: ima: No architecture policies found May 17 00:41:26.036444 kernel: clk: Disabling unused clocks May 17 00:41:26.036457 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:41:26.036482 kernel: Write protecting the kernel read-only data: 28672k May 17 00:41:26.036496 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:41:26.036509 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:41:26.036522 kernel: Run /init as init process May 17 00:41:26.036536 kernel: with arguments: May 17 00:41:26.036550 kernel: /init May 17 00:41:26.036588 kernel: with environment: May 17 00:41:26.036610 kernel: HOME=/ May 17 00:41:26.036624 kernel: TERM=linux May 17 00:41:26.036638 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:41:26.036658 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:41:26.036675 systemd[1]: Detected virtualization kvm. May 17 00:41:26.036690 systemd[1]: Detected architecture x86-64. May 17 00:41:26.036704 systemd[1]: Running in initrd. May 17 00:41:26.036732 systemd[1]: No hostname configured, using default hostname. May 17 00:41:26.036746 systemd[1]: Hostname set to . May 17 00:41:26.036761 systemd[1]: Initializing machine ID from VM UUID. May 17 00:41:26.036779 systemd[1]: Queued start job for default target initrd.target. May 17 00:41:26.036793 systemd[1]: Started systemd-ask-password-console.path. May 17 00:41:26.036808 systemd[1]: Reached target cryptsetup.target. May 17 00:41:26.036822 systemd[1]: Reached target paths.target. May 17 00:41:26.036836 systemd[1]: Reached target slices.target. May 17 00:41:26.036850 systemd[1]: Reached target swap.target. May 17 00:41:26.036864 systemd[1]: Reached target timers.target. May 17 00:41:26.036882 systemd[1]: Listening on iscsid.socket. May 17 00:41:26.036896 systemd[1]: Listening on iscsiuio.socket. May 17 00:41:26.036911 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:41:26.036925 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:41:26.036940 systemd[1]: Listening on systemd-journald.socket. May 17 00:41:26.036954 systemd[1]: Listening on systemd-networkd.socket. May 17 00:41:26.036969 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:41:26.036983 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:41:26.036997 systemd[1]: Reached target sockets.target. May 17 00:41:26.037014 systemd[1]: Starting kmod-static-nodes.service... May 17 00:41:26.037030 systemd[1]: Finished network-cleanup.service. May 17 00:41:26.037047 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:41:26.037062 systemd[1]: Starting systemd-journald.service... May 17 00:41:26.037079 systemd[1]: Starting systemd-modules-load.service... May 17 00:41:26.037096 systemd[1]: Starting systemd-resolved.service... May 17 00:41:26.037110 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:41:26.037126 systemd[1]: Finished kmod-static-nodes.service. May 17 00:41:26.037147 systemd-journald[184]: Journal started May 17 00:41:26.037222 systemd-journald[184]: Runtime Journal (/run/log/journal/b548874142714b8782f9fb263d547e1a) is 4.9M, max 39.5M, 34.5M free. May 17 00:41:26.023198 systemd-modules-load[185]: Inserted module 'overlay' May 17 00:41:26.074612 systemd[1]: Started systemd-journald.service. May 17 00:41:26.049973 systemd-resolved[186]: Positive Trust Anchors: May 17 00:41:26.088332 kernel: audit: type=1130 audit(1747442486.070:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.088371 kernel: audit: type=1130 audit(1747442486.072:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.088391 kernel: audit: type=1130 audit(1747442486.072:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.088412 kernel: audit: type=1130 audit(1747442486.077:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.049990 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:41:26.050045 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:41:26.100415 kernel: audit: type=1130 audit(1747442486.088:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.100454 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:41:26.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.105209 kernel: audit: type=1130 audit(1747442486.100:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.054136 systemd-resolved[186]: Defaulting to hostname 'linux'. May 17 00:41:26.073042 systemd[1]: Started systemd-resolved.service. May 17 00:41:26.073693 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:41:26.078517 systemd[1]: Reached target nss-lookup.target. May 17 00:41:26.087018 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:41:26.087936 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:41:26.091227 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:41:26.115768 kernel: Bridge firewalling registered May 17 00:41:26.100058 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:41:26.112173 systemd-modules-load[185]: Inserted module 'br_netfilter' May 17 00:41:26.128532 kernel: audit: type=1130 audit(1747442486.122:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.122405 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:41:26.124231 systemd[1]: Starting dracut-cmdline.service... May 17 00:41:26.140986 dracut-cmdline[201]: dracut-dracut-053 May 17 00:41:26.144799 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:41:26.149749 kernel: SCSI subsystem initialized May 17 00:41:26.175356 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:41:26.175442 kernel: device-mapper: uevent: version 1.0.3 May 17 00:41:26.177393 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:41:26.181784 systemd-modules-load[185]: Inserted module 'dm_multipath' May 17 00:41:26.182834 systemd[1]: Finished systemd-modules-load.service. May 17 00:41:26.188223 kernel: audit: type=1130 audit(1747442486.182:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.186672 systemd[1]: Starting systemd-sysctl.service... May 17 00:41:26.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.198753 systemd[1]: Finished systemd-sysctl.service. May 17 00:41:26.203037 kernel: audit: type=1130 audit(1747442486.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.232749 kernel: Loading iSCSI transport class v2.0-870. May 17 00:41:26.253758 kernel: iscsi: registered transport (tcp) May 17 00:41:26.284756 kernel: iscsi: registered transport (qla4xxx) May 17 00:41:26.284844 kernel: QLogic iSCSI HBA Driver May 17 00:41:26.335677 systemd[1]: Finished dracut-cmdline.service. May 17 00:41:26.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.337170 systemd[1]: Starting dracut-pre-udev.service... May 17 00:41:26.397824 kernel: raid6: avx2x4 gen() 14304 MB/s May 17 00:41:26.414788 kernel: raid6: avx2x4 xor() 5789 MB/s May 17 00:41:26.431792 kernel: raid6: avx2x2 gen() 14232 MB/s May 17 00:41:26.448798 kernel: raid6: avx2x2 xor() 14421 MB/s May 17 00:41:26.465812 kernel: raid6: avx2x1 gen() 11031 MB/s May 17 00:41:26.482808 kernel: raid6: avx2x1 xor() 11802 MB/s May 17 00:41:26.499804 kernel: raid6: sse2x4 gen() 9763 MB/s May 17 00:41:26.516793 kernel: raid6: sse2x4 xor() 5179 MB/s May 17 00:41:26.533784 kernel: raid6: sse2x2 gen() 9128 MB/s May 17 00:41:26.550791 kernel: raid6: sse2x2 xor() 6713 MB/s May 17 00:41:26.567793 kernel: raid6: sse2x1 gen() 10497 MB/s May 17 00:41:26.585410 kernel: raid6: sse2x1 xor() 5218 MB/s May 17 00:41:26.585519 kernel: raid6: using algorithm avx2x4 gen() 14304 MB/s May 17 00:41:26.585533 kernel: raid6: .... xor() 5789 MB/s, rmw enabled May 17 00:41:26.586035 kernel: raid6: using avx2x2 recovery algorithm May 17 00:41:26.603775 kernel: xor: automatically using best checksumming function avx May 17 00:41:26.728773 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:41:26.745303 systemd[1]: Finished dracut-pre-udev.service. May 17 00:41:26.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.745000 audit: BPF prog-id=7 op=LOAD May 17 00:41:26.745000 audit: BPF prog-id=8 op=LOAD May 17 00:41:26.747414 systemd[1]: Starting systemd-udevd.service... May 17 00:41:26.768149 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:41:26.776106 systemd[1]: Started systemd-udevd.service. May 17 00:41:26.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.778395 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:41:26.801703 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation May 17 00:41:26.853771 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:41:26.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.855214 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:41:26.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.924112 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:41:27.002761 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 17 00:41:27.056762 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:41:27.056804 kernel: GPT:9289727 != 125829119 May 17 00:41:27.056822 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:41:27.056864 kernel: scsi host0: Virtio SCSI HBA May 17 00:41:27.057157 kernel: GPT:9289727 != 125829119 May 17 00:41:27.057175 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:41:27.057191 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:41:27.057206 kernel: ACPI: bus type USB registered May 17 00:41:27.057222 kernel: usbcore: registered new interface driver usbfs May 17 00:41:27.057247 kernel: usbcore: registered new interface driver hub May 17 00:41:27.057263 kernel: usbcore: registered new device driver usb May 17 00:41:27.057280 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:41:27.059800 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 17 00:41:27.096753 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 17 00:41:27.100755 kernel: ehci-pci: EHCI PCI platform driver May 17 00:41:27.107764 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 17 00:41:27.152658 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:41:27.152773 kernel: AES CTR mode by8 optimization enabled May 17 00:41:27.152604 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:41:27.242488 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (431) May 17 00:41:27.242527 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 17 00:41:27.242846 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 17 00:41:27.243014 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 17 00:41:27.243228 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 17 00:41:27.243390 kernel: hub 1-0:1.0: USB hub found May 17 00:41:27.243614 kernel: hub 1-0:1.0: 2 ports detected May 17 00:41:27.243813 kernel: libata version 3.00 loaded. May 17 00:41:27.243835 kernel: ata_piix 0000:00:01.1: version 2.13 May 17 00:41:27.244101 kernel: scsi host1: ata_piix May 17 00:41:27.244371 kernel: scsi host2: ata_piix May 17 00:41:27.244599 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 17 00:41:27.244621 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 17 00:41:27.245147 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:41:27.256245 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:41:27.256970 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:41:27.264518 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:41:27.266142 systemd[1]: Starting disk-uuid.service... May 17 00:41:27.274395 disk-uuid[504]: Primary Header is updated. May 17 00:41:27.274395 disk-uuid[504]: Secondary Entries is updated. May 17 00:41:27.274395 disk-uuid[504]: Secondary Header is updated. May 17 00:41:27.283759 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:41:27.290012 kernel: GPT:disk_guids don't match. May 17 00:41:27.290111 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:41:27.290147 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:41:27.301779 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:41:28.298954 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:41:28.299023 disk-uuid[505]: The operation has completed successfully. May 17 00:41:28.341492 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:41:28.342286 systemd[1]: Finished disk-uuid.service. May 17 00:41:28.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.344259 systemd[1]: Starting verity-setup.service... May 17 00:41:28.366752 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:41:28.428582 systemd[1]: Found device dev-mapper-usr.device. May 17 00:41:28.430325 systemd[1]: Mounting sysusr-usr.mount... May 17 00:41:28.432686 systemd[1]: Finished verity-setup.service. May 17 00:41:28.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.525768 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:41:28.526981 systemd[1]: Mounted sysusr-usr.mount. May 17 00:41:28.527614 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:41:28.528648 systemd[1]: Starting ignition-setup.service... May 17 00:41:28.530011 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:41:28.547185 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:41:28.547278 kernel: BTRFS info (device vda6): using free space tree May 17 00:41:28.547301 kernel: BTRFS info (device vda6): has skinny extents May 17 00:41:28.564736 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:41:28.575757 systemd[1]: Finished ignition-setup.service. May 17 00:41:28.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.577441 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:41:28.698705 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:41:28.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.699000 audit: BPF prog-id=9 op=LOAD May 17 00:41:28.701235 systemd[1]: Starting systemd-networkd.service... May 17 00:41:28.731669 systemd-networkd[689]: lo: Link UP May 17 00:41:28.731682 systemd-networkd[689]: lo: Gained carrier May 17 00:41:28.732690 systemd-networkd[689]: Enumeration completed May 17 00:41:28.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.732946 systemd[1]: Started systemd-networkd.service. May 17 00:41:28.733763 systemd[1]: Reached target network.target. May 17 00:41:28.735612 systemd[1]: Starting iscsiuio.service... May 17 00:41:28.736698 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:41:28.737889 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 17 00:41:28.739309 systemd-networkd[689]: eth1: Link UP May 17 00:41:28.739316 systemd-networkd[689]: eth1: Gained carrier May 17 00:41:28.751285 ignition[607]: Ignition 2.14.0 May 17 00:41:28.751298 ignition[607]: Stage: fetch-offline May 17 00:41:28.751382 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:28.751410 ignition[607]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:28.758249 systemd-networkd[689]: eth0: Link UP May 17 00:41:28.758261 systemd-networkd[689]: eth0: Gained carrier May 17 00:41:28.762241 systemd[1]: Started iscsiuio.service. May 17 00:41:28.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.763356 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:28.763504 ignition[607]: parsed url from cmdline: "" May 17 00:41:28.764362 systemd[1]: Starting iscsid.service... May 17 00:41:28.763511 ignition[607]: no config URL provided May 17 00:41:28.779576 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:41:28.779576 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:41:28.779576 iscsid[695]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:41:28.779576 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:41:28.779576 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:41:28.779576 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:41:28.779576 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:41:28.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.763519 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:41:28.777029 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:41:28.763533 ignition[607]: no config at "/usr/lib/ignition/user.ign" May 17 00:41:28.779046 systemd[1]: Starting ignition-fetch.service... May 17 00:41:28.763540 ignition[607]: failed to fetch config: resource requires networking May 17 00:41:28.779644 systemd[1]: Started iscsid.service. May 17 00:41:28.765449 ignition[607]: Ignition finished successfully May 17 00:41:28.786051 systemd[1]: Starting dracut-initqueue.service... May 17 00:41:28.796905 systemd-networkd[689]: eth0: DHCPv4 address 137.184.231.134/20, gateway 137.184.224.1 acquired from 169.254.169.253 May 17 00:41:28.798911 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.26/20 acquired from 169.254.169.253 May 17 00:41:28.805223 ignition[696]: Ignition 2.14.0 May 17 00:41:28.806135 ignition[696]: Stage: fetch May 17 00:41:28.806908 ignition[696]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:28.807618 ignition[696]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:28.808834 systemd[1]: Finished dracut-initqueue.service. May 17 00:41:28.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.809502 systemd[1]: Reached target remote-fs-pre.target. May 17 00:41:28.810096 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:41:28.810940 systemd[1]: Reached target remote-fs.target. May 17 00:41:28.814233 ignition[696]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:28.813265 systemd[1]: Starting dracut-pre-mount.service... May 17 00:41:28.814371 ignition[696]: parsed url from cmdline: "" May 17 00:41:28.814376 ignition[696]: no config URL provided May 17 00:41:28.814383 ignition[696]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:41:28.814398 ignition[696]: no config at "/usr/lib/ignition/user.ign" May 17 00:41:28.814436 ignition[696]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 17 00:41:28.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.830197 systemd[1]: Finished dracut-pre-mount.service. May 17 00:41:28.837017 ignition[696]: GET result: OK May 17 00:41:28.837211 ignition[696]: parsing config with SHA512: 99200998f485b82c4db02285f17ca86014cb48e2c784367d427e7dd941ee13e03583deb1a385a77c9a58dccbfd87cb1df3958b7b53fb2ec4cbc4ef382aa40dc5 May 17 00:41:28.845576 unknown[696]: fetched base config from "system" May 17 00:41:28.845587 unknown[696]: fetched base config from "system" May 17 00:41:28.846092 ignition[696]: fetch: fetch complete May 17 00:41:28.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.845600 unknown[696]: fetched user config from "digitalocean" May 17 00:41:28.846099 ignition[696]: fetch: fetch passed May 17 00:41:28.848030 systemd[1]: Finished ignition-fetch.service. May 17 00:41:28.846170 ignition[696]: Ignition finished successfully May 17 00:41:28.849709 systemd[1]: Starting ignition-kargs.service... May 17 00:41:28.863581 ignition[715]: Ignition 2.14.0 May 17 00:41:28.864467 ignition[715]: Stage: kargs May 17 00:41:28.865126 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:28.865819 ignition[715]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:28.868264 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:28.870352 ignition[715]: kargs: kargs passed May 17 00:41:28.870934 ignition[715]: Ignition finished successfully May 17 00:41:28.872622 systemd[1]: Finished ignition-kargs.service. May 17 00:41:28.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.875287 systemd[1]: Starting ignition-disks.service... May 17 00:41:28.886000 ignition[721]: Ignition 2.14.0 May 17 00:41:28.886015 ignition[721]: Stage: disks May 17 00:41:28.886194 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:28.886215 ignition[721]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:28.888052 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:28.889344 ignition[721]: disks: disks passed May 17 00:41:28.889408 ignition[721]: Ignition finished successfully May 17 00:41:28.891686 systemd[1]: Finished ignition-disks.service. May 17 00:41:28.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.893038 systemd[1]: Reached target initrd-root-device.target. May 17 00:41:28.893532 systemd[1]: Reached target local-fs-pre.target. May 17 00:41:28.894316 systemd[1]: Reached target local-fs.target. May 17 00:41:28.895206 systemd[1]: Reached target sysinit.target. May 17 00:41:28.895956 systemd[1]: Reached target basic.target. May 17 00:41:28.898173 systemd[1]: Starting systemd-fsck-root.service... May 17 00:41:28.918634 systemd-fsck[729]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:41:28.923493 systemd[1]: Finished systemd-fsck-root.service. May 17 00:41:28.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:28.925862 systemd[1]: Mounting sysroot.mount... May 17 00:41:28.943761 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:41:28.944514 systemd[1]: Mounted sysroot.mount. May 17 00:41:28.945215 systemd[1]: Reached target initrd-root-fs.target. May 17 00:41:28.947455 systemd[1]: Mounting sysroot-usr.mount... May 17 00:41:28.949039 systemd[1]: Starting flatcar-digitalocean-network.service... May 17 00:41:28.950948 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:41:28.951381 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:41:28.951426 systemd[1]: Reached target ignition-diskful.target. May 17 00:41:28.959267 systemd[1]: Mounted sysroot-usr.mount. May 17 00:41:28.963071 systemd[1]: Starting initrd-setup-root.service... May 17 00:41:28.972883 initrd-setup-root[741]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:41:28.989205 initrd-setup-root[749]: cut: /sysroot/etc/group: No such file or directory May 17 00:41:29.001320 initrd-setup-root[759]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:41:29.016176 initrd-setup-root[767]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:41:29.104522 systemd[1]: Finished initrd-setup-root.service. May 17 00:41:29.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.106549 systemd[1]: Starting ignition-mount.service... May 17 00:41:29.114442 systemd[1]: Starting sysroot-boot.service... May 17 00:41:29.126803 bash[786]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:41:29.154205 coreos-metadata[736]: May 17 00:41:29.153 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:41:29.159424 coreos-metadata[735]: May 17 00:41:29.159 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:41:29.161932 ignition[787]: INFO : Ignition 2.14.0 May 17 00:41:29.162767 ignition[787]: INFO : Stage: mount May 17 00:41:29.162767 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:29.162767 ignition[787]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:29.165961 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:29.170198 ignition[787]: INFO : mount: mount passed May 17 00:41:29.170705 ignition[787]: INFO : Ignition finished successfully May 17 00:41:29.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.172190 systemd[1]: Finished ignition-mount.service. May 17 00:41:29.175349 systemd[1]: Finished sysroot-boot.service. May 17 00:41:29.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.178423 coreos-metadata[736]: May 17 00:41:29.178 INFO Fetch successful May 17 00:41:29.181763 coreos-metadata[735]: May 17 00:41:29.181 INFO Fetch successful May 17 00:41:29.185291 coreos-metadata[736]: May 17 00:41:29.185 INFO wrote hostname ci-3510.3.7-n-c83c2ac4fc to /sysroot/etc/hostname May 17 00:41:29.186028 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:41:29.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.190548 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 17 00:41:29.190677 systemd[1]: Finished flatcar-digitalocean-network.service. May 17 00:41:29.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:29.454551 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:41:29.464885 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (796) May 17 00:41:29.474223 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:41:29.474316 kernel: BTRFS info (device vda6): using free space tree May 17 00:41:29.474329 kernel: BTRFS info (device vda6): has skinny extents May 17 00:41:29.480812 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:41:29.483099 systemd[1]: Starting ignition-files.service... May 17 00:41:29.510470 ignition[816]: INFO : Ignition 2.14.0 May 17 00:41:29.510470 ignition[816]: INFO : Stage: files May 17 00:41:29.511990 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:29.511990 ignition[816]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:29.513750 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:29.516318 ignition[816]: DEBUG : files: compiled without relabeling support, skipping May 17 00:41:29.517602 ignition[816]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:41:29.517602 ignition[816]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:41:29.520710 ignition[816]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:41:29.521608 ignition[816]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:41:29.522209 ignition[816]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:41:29.522095 unknown[816]: wrote ssh authorized keys file for user: core May 17 00:41:29.527860 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:41:29.527860 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 May 17 00:41:29.568597 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:41:29.784639 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:41:29.785597 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:41:29.786714 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:41:29.787420 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:41:29.788449 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:41:29.789119 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:41:29.789972 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:41:29.790677 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:41:29.791823 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:41:29.793194 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:41:29.794019 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:41:29.794019 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:41:29.794019 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:41:29.794019 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:41:29.794019 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:41:30.455655 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 00:41:30.583100 systemd-networkd[689]: eth1: Gained IPv6LL May 17 00:41:30.711207 systemd-networkd[689]: eth0: Gained IPv6LL May 17 00:41:30.850397 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:41:30.851670 ignition[816]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:41:30.852408 ignition[816]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:41:30.853102 ignition[816]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 17 00:41:30.854179 ignition[816]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:41:30.855497 ignition[816]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:41:30.855497 ignition[816]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 17 00:41:30.855497 ignition[816]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:41:30.858277 ignition[816]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:41:30.858277 ignition[816]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 17 00:41:30.858277 ignition[816]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:41:30.867813 ignition[816]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:41:30.868980 ignition[816]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:41:30.868980 ignition[816]: INFO : files: files passed May 17 00:41:30.868980 ignition[816]: INFO : Ignition finished successfully May 17 00:41:30.871282 systemd[1]: Finished ignition-files.service. May 17 00:41:30.876940 kernel: kauditd_printk_skb: 29 callbacks suppressed May 17 00:41:30.877035 kernel: audit: type=1130 audit(1747442490.871:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.875753 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:41:30.878777 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:41:30.882512 systemd[1]: Starting ignition-quench.service... May 17 00:41:30.887821 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:41:30.895827 kernel: audit: type=1130 audit(1747442490.888:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.895903 kernel: audit: type=1131 audit(1747442490.888:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.888134 systemd[1]: Finished ignition-quench.service. May 17 00:41:30.897967 initrd-setup-root-after-ignition[841]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:41:30.899084 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:41:30.903919 kernel: audit: type=1130 audit(1747442490.898:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.899843 systemd[1]: Reached target ignition-complete.target. May 17 00:41:30.906861 systemd[1]: Starting initrd-parse-etc.service... May 17 00:41:30.935069 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:41:30.935268 systemd[1]: Finished initrd-parse-etc.service. May 17 00:41:30.941628 kernel: audit: type=1130 audit(1747442490.935:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.941673 kernel: audit: type=1131 audit(1747442490.935:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.936401 systemd[1]: Reached target initrd-fs.target. May 17 00:41:30.941999 systemd[1]: Reached target initrd.target. May 17 00:41:30.942846 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:41:30.944262 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:41:30.962060 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:41:30.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.966875 kernel: audit: type=1130 audit(1747442490.961:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.963860 systemd[1]: Starting initrd-cleanup.service... May 17 00:41:30.978789 systemd[1]: Stopped target nss-lookup.target. May 17 00:41:30.980628 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:41:30.981814 systemd[1]: Stopped target timers.target. May 17 00:41:30.982806 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:41:30.983540 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:41:30.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.987749 kernel: audit: type=1131 audit(1747442490.983:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:30.988049 systemd[1]: Stopped target initrd.target. May 17 00:41:30.989280 systemd[1]: Stopped target basic.target. May 17 00:41:30.990672 systemd[1]: Stopped target ignition-complete.target. May 17 00:41:30.999229 systemd[1]: Stopped target ignition-diskful.target. May 17 00:41:31.000070 systemd[1]: Stopped target initrd-root-device.target. May 17 00:41:31.001221 systemd[1]: Stopped target remote-fs.target. May 17 00:41:31.002058 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:41:31.003006 systemd[1]: Stopped target sysinit.target. May 17 00:41:31.004145 systemd[1]: Stopped target local-fs.target. May 17 00:41:31.005054 systemd[1]: Stopped target local-fs-pre.target. May 17 00:41:31.005823 systemd[1]: Stopped target swap.target. May 17 00:41:31.006606 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:41:31.011643 kernel: audit: type=1131 audit(1747442491.006:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.006848 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:41:31.007495 systemd[1]: Stopped target cryptsetup.target. May 17 00:41:31.012309 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:41:31.018063 kernel: audit: type=1131 audit(1747442491.013:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.012525 systemd[1]: Stopped dracut-initqueue.service. May 17 00:41:31.014053 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:41:31.014322 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:41:31.021377 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:41:31.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.021636 systemd[1]: Stopped ignition-files.service. May 17 00:41:31.023041 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:41:31.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.023233 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:41:31.032398 iscsid[695]: iscsid shutting down. May 17 00:41:31.026185 systemd[1]: Stopping ignition-mount.service... May 17 00:41:31.034397 systemd[1]: Stopping iscsid.service... May 17 00:41:31.035735 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:41:31.036208 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:41:31.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.041798 systemd[1]: Stopping sysroot-boot.service... May 17 00:41:31.042477 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:41:31.042793 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:41:31.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.043792 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:41:31.044042 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:41:31.048964 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:41:31.049195 systemd[1]: Stopped iscsid.service. May 17 00:41:31.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.056491 systemd[1]: Stopping iscsiuio.service... May 17 00:41:31.057563 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:41:31.057772 systemd[1]: Stopped iscsiuio.service. May 17 00:41:31.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.059526 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:41:31.059806 systemd[1]: Finished initrd-cleanup.service. May 17 00:41:31.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.065026 ignition[854]: INFO : Ignition 2.14.0 May 17 00:41:31.066011 ignition[854]: INFO : Stage: umount May 17 00:41:31.066886 ignition[854]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:41:31.067666 ignition[854]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:41:31.071744 ignition[854]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:41:31.074640 ignition[854]: INFO : umount: umount passed May 17 00:41:31.075498 ignition[854]: INFO : Ignition finished successfully May 17 00:41:31.077808 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:41:31.077986 systemd[1]: Stopped ignition-mount.service. May 17 00:41:31.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.079236 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:41:31.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.079326 systemd[1]: Stopped ignition-disks.service. May 17 00:41:31.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.080021 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:41:31.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.080090 systemd[1]: Stopped ignition-kargs.service. May 17 00:41:31.081057 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:41:31.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.081121 systemd[1]: Stopped ignition-fetch.service. May 17 00:41:31.082002 systemd[1]: Stopped target network.target. May 17 00:41:31.082862 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:41:31.082940 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:41:31.084169 systemd[1]: Stopped target paths.target. May 17 00:41:31.085686 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:41:31.087980 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:41:31.088641 systemd[1]: Stopped target slices.target. May 17 00:41:31.090222 systemd[1]: Stopped target sockets.target. May 17 00:41:31.091257 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:41:31.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.091336 systemd[1]: Closed iscsid.socket. May 17 00:41:31.094063 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:41:31.094129 systemd[1]: Closed iscsiuio.socket. May 17 00:41:31.095019 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:41:31.095113 systemd[1]: Stopped ignition-setup.service. May 17 00:41:31.096240 systemd[1]: Stopping systemd-networkd.service... May 17 00:41:31.096840 systemd[1]: Stopping systemd-resolved.service... May 17 00:41:31.098966 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:41:31.104268 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:41:31.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.104428 systemd[1]: Stopped systemd-resolved.service. May 17 00:41:31.104757 systemd-networkd[689]: eth1: DHCPv6 lease lost May 17 00:41:31.107131 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:41:31.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.107264 systemd[1]: Stopped sysroot-boot.service. May 17 00:41:31.108892 systemd-networkd[689]: eth0: DHCPv6 lease lost May 17 00:41:31.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.110739 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:41:31.111000 audit: BPF prog-id=6 op=UNLOAD May 17 00:41:31.110905 systemd[1]: Stopped systemd-networkd.service. May 17 00:41:31.112642 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:41:31.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.112700 systemd[1]: Closed systemd-networkd.socket. May 17 00:41:31.113528 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:41:31.115000 audit: BPF prog-id=9 op=UNLOAD May 17 00:41:31.113604 systemd[1]: Stopped initrd-setup-root.service. May 17 00:41:31.115678 systemd[1]: Stopping network-cleanup.service... May 17 00:41:31.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.116884 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:41:31.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.117003 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:41:31.117981 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:41:31.118078 systemd[1]: Stopped systemd-sysctl.service. May 17 00:41:31.121494 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:41:31.121579 systemd[1]: Stopped systemd-modules-load.service. May 17 00:41:31.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.125291 systemd[1]: Stopping systemd-udevd.service... May 17 00:41:31.133369 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:41:31.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.138690 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:41:31.138873 systemd[1]: Stopped network-cleanup.service. May 17 00:41:31.139857 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:41:31.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.140082 systemd[1]: Stopped systemd-udevd.service. May 17 00:41:31.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.140951 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:41:31.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.141012 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:41:31.141840 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:41:31.141928 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:41:31.142684 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:41:31.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.142796 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:41:31.143637 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:41:31.143714 systemd[1]: Stopped dracut-cmdline.service. May 17 00:41:31.144786 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:41:31.144867 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:41:31.147063 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:41:31.148296 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:41:31.148464 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:41:31.162025 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:41:31.162177 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:41:31.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.163606 systemd[1]: Reached target initrd-switch-root.target. May 17 00:41:31.165301 systemd[1]: Starting initrd-switch-root.service... May 17 00:41:31.179754 systemd[1]: Switching root. May 17 00:41:31.200077 systemd-journald[184]: Journal stopped May 17 00:41:35.134350 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). May 17 00:41:35.134460 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:41:35.134492 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:41:35.134513 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:41:35.134533 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:41:35.134552 kernel: SELinux: policy capability open_perms=1 May 17 00:41:35.134579 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:41:35.134604 kernel: SELinux: policy capability always_check_network=0 May 17 00:41:35.134627 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:41:35.134647 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:41:35.134668 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:41:35.134696 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:41:35.134731 systemd[1]: Successfully loaded SELinux policy in 60.258ms. May 17 00:41:35.137333 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.855ms. May 17 00:41:35.137358 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:41:35.137385 systemd[1]: Detected virtualization kvm. May 17 00:41:35.137412 systemd[1]: Detected architecture x86-64. May 17 00:41:35.137432 systemd[1]: Detected first boot. May 17 00:41:35.137458 systemd[1]: Hostname set to . May 17 00:41:35.137663 systemd[1]: Initializing machine ID from VM UUID. May 17 00:41:35.137689 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:41:35.137711 systemd[1]: Populated /etc with preset unit settings. May 17 00:41:35.137775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:41:35.137806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:41:35.137836 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:41:35.137859 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:41:35.137880 systemd[1]: Stopped initrd-switch-root.service. May 17 00:41:35.137901 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:41:35.137923 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:41:35.137944 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:41:35.137991 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:41:35.138021 systemd[1]: Created slice system-getty.slice. May 17 00:41:35.138047 systemd[1]: Created slice system-modprobe.slice. May 17 00:41:35.138067 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:41:35.138089 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:41:35.138113 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:41:35.138135 systemd[1]: Created slice user.slice. May 17 00:41:35.138155 systemd[1]: Started systemd-ask-password-console.path. May 17 00:41:35.138176 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:41:35.138197 systemd[1]: Set up automount boot.automount. May 17 00:41:35.138223 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:41:35.138244 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:41:35.138265 systemd[1]: Stopped target initrd-fs.target. May 17 00:41:35.138285 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:41:35.138306 systemd[1]: Reached target integritysetup.target. May 17 00:41:35.138327 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:41:35.138348 systemd[1]: Reached target remote-fs.target. May 17 00:41:35.138373 systemd[1]: Reached target slices.target. May 17 00:41:35.138394 systemd[1]: Reached target swap.target. May 17 00:41:35.138414 systemd[1]: Reached target torcx.target. May 17 00:41:35.138433 systemd[1]: Reached target veritysetup.target. May 17 00:41:35.138451 systemd[1]: Listening on systemd-coredump.socket. May 17 00:41:35.138470 systemd[1]: Listening on systemd-initctl.socket. May 17 00:41:35.138488 systemd[1]: Listening on systemd-networkd.socket. May 17 00:41:35.138508 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:41:35.138526 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:41:35.138543 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:41:35.138568 systemd[1]: Mounting dev-hugepages.mount... May 17 00:41:35.138584 systemd[1]: Mounting dev-mqueue.mount... May 17 00:41:35.138603 systemd[1]: Mounting media.mount... May 17 00:41:35.138622 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:35.138640 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:41:35.138659 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:41:35.138676 systemd[1]: Mounting tmp.mount... May 17 00:41:35.138692 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:41:35.138710 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:35.138751 systemd[1]: Starting kmod-static-nodes.service... May 17 00:41:35.138774 systemd[1]: Starting modprobe@configfs.service... May 17 00:41:35.138795 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:35.138817 systemd[1]: Starting modprobe@drm.service... May 17 00:41:35.138837 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:35.138859 systemd[1]: Starting modprobe@fuse.service... May 17 00:41:35.138881 systemd[1]: Starting modprobe@loop.service... May 17 00:41:35.138903 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:41:35.138925 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:41:35.138948 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:41:35.138969 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:41:35.138989 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:41:35.139010 systemd[1]: Stopped systemd-journald.service. May 17 00:41:35.139030 systemd[1]: Starting systemd-journald.service... May 17 00:41:35.139051 systemd[1]: Starting systemd-modules-load.service... May 17 00:41:35.139072 systemd[1]: Starting systemd-network-generator.service... May 17 00:41:35.139093 systemd[1]: Starting systemd-remount-fs.service... May 17 00:41:35.139113 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:41:35.139138 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:41:35.139160 systemd[1]: Stopped verity-setup.service. May 17 00:41:35.139181 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:35.139201 systemd[1]: Mounted dev-hugepages.mount. May 17 00:41:35.139222 systemd[1]: Mounted dev-mqueue.mount. May 17 00:41:35.139244 systemd[1]: Mounted media.mount. May 17 00:41:35.139265 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:41:35.139285 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:41:35.139305 systemd[1]: Mounted tmp.mount. May 17 00:41:35.139330 systemd[1]: Finished kmod-static-nodes.service. May 17 00:41:35.139350 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:41:35.139370 systemd[1]: Finished modprobe@configfs.service. May 17 00:41:35.139707 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:35.139763 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:35.139785 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:41:35.139804 systemd[1]: Finished modprobe@drm.service. May 17 00:41:35.139833 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:35.139854 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:35.144297 systemd[1]: Finished systemd-remount-fs.service. May 17 00:41:35.144367 systemd[1]: Finished systemd-modules-load.service. May 17 00:41:35.144391 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:41:35.144414 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:41:35.144437 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:41:35.144470 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:35.144493 systemd[1]: Starting systemd-random-seed.service... May 17 00:41:35.144514 systemd[1]: Starting systemd-sysctl.service... May 17 00:41:35.144536 systemd[1]: Finished systemd-network-generator.service. May 17 00:41:35.144559 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:41:35.144581 systemd[1]: Reached target network-pre.target. May 17 00:41:35.144602 systemd[1]: Finished systemd-random-seed.service. May 17 00:41:35.144622 systemd[1]: Reached target first-boot-complete.target. May 17 00:41:35.144640 kernel: loop: module loaded May 17 00:41:35.144667 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:35.144697 systemd-journald[956]: Journal started May 17 00:41:35.144858 systemd-journald[956]: Runtime Journal (/run/log/journal/b548874142714b8782f9fb263d547e1a) is 4.9M, max 39.5M, 34.5M free. May 17 00:41:31.395000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:41:31.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:41:31.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:41:31.473000 audit: BPF prog-id=10 op=LOAD May 17 00:41:31.473000 audit: BPF prog-id=10 op=UNLOAD May 17 00:41:31.473000 audit: BPF prog-id=11 op=LOAD May 17 00:41:31.473000 audit: BPF prog-id=11 op=UNLOAD May 17 00:41:31.608000 audit[886]: AVC avc: denied { associate } for pid=886 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:41:31.608000 audit[886]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=869 pid=886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.608000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:41:31.610000 audit[886]: AVC avc: denied { associate } for pid=886 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:41:31.610000 audit[886]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=869 pid=886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.610000 audit: CWD cwd="/" May 17 00:41:31.610000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:31.610000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:31.610000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:41:34.851000 audit: BPF prog-id=12 op=LOAD May 17 00:41:34.851000 audit: BPF prog-id=3 op=UNLOAD May 17 00:41:34.851000 audit: BPF prog-id=13 op=LOAD May 17 00:41:34.851000 audit: BPF prog-id=14 op=LOAD May 17 00:41:34.851000 audit: BPF prog-id=4 op=UNLOAD May 17 00:41:34.851000 audit: BPF prog-id=5 op=UNLOAD May 17 00:41:34.853000 audit: BPF prog-id=15 op=LOAD May 17 00:41:34.853000 audit: BPF prog-id=12 op=UNLOAD May 17 00:41:34.853000 audit: BPF prog-id=16 op=LOAD May 17 00:41:34.853000 audit: BPF prog-id=17 op=LOAD May 17 00:41:34.853000 audit: BPF prog-id=13 op=UNLOAD May 17 00:41:34.853000 audit: BPF prog-id=14 op=UNLOAD May 17 00:41:34.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.862000 audit: BPF prog-id=15 op=UNLOAD May 17 00:41:34.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.999000 audit: BPF prog-id=18 op=LOAD May 17 00:41:34.999000 audit: BPF prog-id=19 op=LOAD May 17 00:41:34.999000 audit: BPF prog-id=20 op=LOAD May 17 00:41:34.999000 audit: BPF prog-id=16 op=UNLOAD May 17 00:41:34.999000 audit: BPF prog-id=17 op=UNLOAD May 17 00:41:35.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.153700 systemd[1]: Finished modprobe@loop.service. May 17 00:41:35.153793 systemd[1]: Started systemd-journald.service. May 17 00:41:35.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.130000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:41:35.130000 audit[956]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd623aa0f0 a2=4000 a3=7ffd623aa18c items=0 ppid=1 pid=956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:35.130000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:41:35.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:34.849752 systemd[1]: Queued start job for default target multi-user.target. May 17 00:41:35.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.604539 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:41:34.849775 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:41:31.605265 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:41:34.855145 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:41:31.605300 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:41:35.155676 systemd[1]: Starting systemd-journal-flush.service... May 17 00:41:31.605358 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:41:35.156385 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:31.605372 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:41:35.171658 systemd[1]: Finished systemd-sysctl.service. May 17 00:41:31.605428 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:41:31.605446 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:41:31.605803 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:41:31.605875 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:41:35.179261 systemd-journald[956]: Time spent on flushing to /var/log/journal/b548874142714b8782f9fb263d547e1a is 56.111ms for 1134 entries. May 17 00:41:35.179261 systemd-journald[956]: System Journal (/var/log/journal/b548874142714b8782f9fb263d547e1a) is 8.0M, max 195.6M, 187.6M free. May 17 00:41:35.256310 systemd-journald[956]: Received client request to flush runtime journal. May 17 00:41:35.256382 kernel: fuse: init (API version 7.34) May 17 00:41:35.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.605895 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:41:35.183065 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:41:31.608273 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:41:35.183353 systemd[1]: Finished modprobe@fuse.service. May 17 00:41:31.608328 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:41:35.185851 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:41:35.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:31.608355 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:41:35.193106 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:41:31.608371 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:41:35.258088 systemd[1]: Finished systemd-journal-flush.service. May 17 00:41:31.608398 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:41:31.608413 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:41:34.365446 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:41:34.365845 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:41:34.366010 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:41:34.366260 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:41:34.366327 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:41:34.366408 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2025-05-17T00:41:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:41:35.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.267378 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:41:35.270098 systemd[1]: Starting systemd-sysusers.service... May 17 00:41:35.295639 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:41:35.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.298288 systemd[1]: Starting systemd-udev-settle.service... May 17 00:41:35.313500 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:41:35.319235 systemd[1]: Finished systemd-sysusers.service. May 17 00:41:35.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.960355 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:41:35.964621 kernel: kauditd_printk_skb: 101 callbacks suppressed May 17 00:41:35.964784 kernel: audit: type=1130 audit(1747442495.960:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:35.963000 audit: BPF prog-id=21 op=LOAD May 17 00:41:35.967753 kernel: audit: type=1334 audit(1747442495.963:143): prog-id=21 op=LOAD May 17 00:41:35.967838 kernel: audit: type=1334 audit(1747442495.964:144): prog-id=22 op=LOAD May 17 00:41:35.964000 audit: BPF prog-id=22 op=LOAD May 17 00:41:35.966179 systemd[1]: Starting systemd-udevd.service... May 17 00:41:35.964000 audit: BPF prog-id=7 op=UNLOAD May 17 00:41:35.970493 kernel: audit: type=1334 audit(1747442495.964:145): prog-id=7 op=UNLOAD May 17 00:41:35.970589 kernel: audit: type=1334 audit(1747442495.964:146): prog-id=8 op=UNLOAD May 17 00:41:35.964000 audit: BPF prog-id=8 op=UNLOAD May 17 00:41:35.992198 systemd-udevd[997]: Using default interface naming scheme 'v252'. May 17 00:41:36.018797 systemd[1]: Started systemd-udevd.service. May 17 00:41:36.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.019000 audit: BPF prog-id=23 op=LOAD May 17 00:41:36.021629 systemd[1]: Starting systemd-networkd.service... May 17 00:41:36.024757 kernel: audit: type=1130 audit(1747442496.018:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.024854 kernel: audit: type=1334 audit(1747442496.019:148): prog-id=23 op=LOAD May 17 00:41:36.044344 kernel: audit: type=1334 audit(1747442496.040:149): prog-id=24 op=LOAD May 17 00:41:36.044501 kernel: audit: type=1334 audit(1747442496.041:150): prog-id=25 op=LOAD May 17 00:41:36.044532 kernel: audit: type=1334 audit(1747442496.042:151): prog-id=26 op=LOAD May 17 00:41:36.040000 audit: BPF prog-id=24 op=LOAD May 17 00:41:36.041000 audit: BPF prog-id=25 op=LOAD May 17 00:41:36.042000 audit: BPF prog-id=26 op=LOAD May 17 00:41:36.044255 systemd[1]: Starting systemd-userdbd.service... May 17 00:41:36.094288 systemd[1]: Started systemd-userdbd.service. May 17 00:41:36.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.102429 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:36.102804 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:36.104771 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:36.107841 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:36.110957 systemd[1]: Starting modprobe@loop.service... May 17 00:41:36.111876 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:41:36.112037 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:41:36.112144 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:36.115604 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:36.115821 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:36.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.116620 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:36.116766 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:36.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.117453 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:36.117591 systemd[1]: Finished modprobe@loop.service. May 17 00:41:36.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.118169 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:36.118238 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:36.159935 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:41:36.237759 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:41:36.239358 systemd-networkd[1001]: lo: Link UP May 17 00:41:36.239370 systemd-networkd[1001]: lo: Gained carrier May 17 00:41:36.240211 systemd-networkd[1001]: Enumeration completed May 17 00:41:36.240373 systemd[1]: Started systemd-networkd.service. May 17 00:41:36.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.241096 systemd-networkd[1001]: eth1: Configuring with /run/systemd/network/10-7e:55:df:ee:3c:5d.network. May 17 00:41:36.242635 systemd-networkd[1001]: eth0: Configuring with /run/systemd/network/10-12:77:d3:c6:38:60.network. May 17 00:41:36.243464 systemd-networkd[1001]: eth1: Link UP May 17 00:41:36.243475 systemd-networkd[1001]: eth1: Gained carrier May 17 00:41:36.248278 systemd-networkd[1001]: eth0: Link UP May 17 00:41:36.248290 systemd-networkd[1001]: eth0: Gained carrier May 17 00:41:36.256497 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:41:36.274785 kernel: ACPI: button: Power Button [PWRF] May 17 00:41:36.284000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:41:36.284000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a81fa34830 a1=338ac a2=7f88cb2fbbc5 a3=5 items=110 ppid=997 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:36.284000 audit: CWD cwd="/" May 17 00:41:36.284000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=1 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=2 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=3 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=4 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=5 name=(null) inode=14561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=6 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=7 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=8 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=9 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=10 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=11 name=(null) inode=14564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=12 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=13 name=(null) inode=14565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=14 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=15 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=16 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=17 name=(null) inode=14567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=18 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=19 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=20 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=21 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=22 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=23 name=(null) inode=14570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=24 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=25 name=(null) inode=14571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=26 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=27 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=28 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=29 name=(null) inode=14573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=30 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=31 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=32 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=33 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=34 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=35 name=(null) inode=14576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=36 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=37 name=(null) inode=14577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=38 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=39 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=40 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=41 name=(null) inode=14579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=42 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=43 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=44 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=45 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=46 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=47 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=48 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=49 name=(null) inode=14583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=50 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=51 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=52 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=53 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=55 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=56 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=57 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=58 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=59 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=60 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=61 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=62 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=63 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=64 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=65 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=66 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=67 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=68 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=69 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=70 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=71 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=72 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=73 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=74 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=75 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=76 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=77 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=78 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=79 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=80 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=81 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=82 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=83 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=84 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=85 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=86 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=87 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=88 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=89 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=90 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=91 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=92 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=93 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=94 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=95 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=96 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=97 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=98 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=99 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=100 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=101 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=102 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=103 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=104 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=105 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=106 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=107 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PATH item=109 name=(null) inode=14613 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:36.284000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:41:36.315771 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:41:36.322747 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 17 00:41:36.352534 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:41:36.469758 kernel: EDAC MC: Ver: 3.0.0 May 17 00:41:36.494579 systemd[1]: Finished systemd-udev-settle.service. May 17 00:41:36.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.497817 systemd[1]: Starting lvm2-activation-early.service... May 17 00:41:36.520323 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:41:36.550890 systemd[1]: Finished lvm2-activation-early.service. May 17 00:41:36.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.551840 systemd[1]: Reached target cryptsetup.target. May 17 00:41:36.554553 systemd[1]: Starting lvm2-activation.service... May 17 00:41:36.561061 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:41:36.585653 systemd[1]: Finished lvm2-activation.service. May 17 00:41:36.586337 systemd[1]: Reached target local-fs-pre.target. May 17 00:41:36.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.588829 systemd[1]: Mounting media-configdrive.mount... May 17 00:41:36.589325 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:41:36.589373 systemd[1]: Reached target machines.target. May 17 00:41:36.591235 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:41:36.609973 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:41:36.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.611757 kernel: ISO 9660 Extensions: RRIP_1991A May 17 00:41:36.613693 systemd[1]: Mounted media-configdrive.mount. May 17 00:41:36.614635 systemd[1]: Reached target local-fs.target. May 17 00:41:36.617191 systemd[1]: Starting ldconfig.service... May 17 00:41:36.618295 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:36.618412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:36.621062 systemd[1]: Starting systemd-boot-update.service... May 17 00:41:36.625579 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:41:36.629323 systemd[1]: Starting systemd-sysext.service... May 17 00:41:36.636527 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1042 (bootctl) May 17 00:41:36.638560 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:41:36.660157 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:41:36.688623 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:41:36.688934 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:41:36.691505 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:41:36.692811 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:41:36.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.714776 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:41:36.755757 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:41:36.764821 systemd-fsck[1049]: fsck.fat 4.2 (2021-01-31) May 17 00:41:36.764821 systemd-fsck[1049]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:41:36.766349 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:41:36.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.769088 systemd[1]: Mounting boot.mount... May 17 00:41:36.784097 systemd[1]: Mounted boot.mount. May 17 00:41:36.790802 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:41:36.810739 (sd-sysext)[1053]: Using extensions 'kubernetes'. May 17 00:41:36.813520 (sd-sysext)[1053]: Merged extensions into '/usr'. May 17 00:41:36.827362 systemd[1]: Finished systemd-boot-update.service. May 17 00:41:36.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.843269 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:36.846002 systemd[1]: Mounting usr-share-oem.mount... May 17 00:41:36.847733 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:36.850667 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:36.854513 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:36.858783 systemd[1]: Starting modprobe@loop.service... May 17 00:41:36.859301 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:36.859595 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:36.859851 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:36.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.863464 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:36.863684 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:36.870219 systemd[1]: Mounted usr-share-oem.mount. May 17 00:41:36.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.875145 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:36.875307 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:36.876327 systemd[1]: Finished systemd-sysext.service. May 17 00:41:36.879162 systemd[1]: Starting ensure-sysext.service... May 17 00:41:36.880494 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:36.883562 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:41:36.885166 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:36.885349 systemd[1]: Finished modprobe@loop.service. May 17 00:41:36.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.888052 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:36.898952 systemd[1]: Reloading. May 17 00:41:36.913382 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:41:36.919274 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:41:36.926165 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:41:37.076384 ldconfig[1041]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:41:37.094628 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2025-05-17T00:41:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:41:37.097539 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2025-05-17T00:41:37Z" level=info msg="torcx already run" May 17 00:41:37.224879 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:41:37.225455 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:41:37.257545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:41:37.333000 audit: BPF prog-id=27 op=LOAD May 17 00:41:37.333000 audit: BPF prog-id=28 op=LOAD May 17 00:41:37.333000 audit: BPF prog-id=21 op=UNLOAD May 17 00:41:37.333000 audit: BPF prog-id=22 op=UNLOAD May 17 00:41:37.335000 audit: BPF prog-id=29 op=LOAD May 17 00:41:37.335000 audit: BPF prog-id=23 op=UNLOAD May 17 00:41:37.337000 audit: BPF prog-id=30 op=LOAD May 17 00:41:37.337000 audit: BPF prog-id=24 op=UNLOAD May 17 00:41:37.337000 audit: BPF prog-id=31 op=LOAD May 17 00:41:37.338000 audit: BPF prog-id=32 op=LOAD May 17 00:41:37.338000 audit: BPF prog-id=25 op=UNLOAD May 17 00:41:37.338000 audit: BPF prog-id=26 op=UNLOAD May 17 00:41:37.338000 audit: BPF prog-id=33 op=LOAD May 17 00:41:37.339000 audit: BPF prog-id=18 op=UNLOAD May 17 00:41:37.339000 audit: BPF prog-id=34 op=LOAD May 17 00:41:37.339000 audit: BPF prog-id=35 op=LOAD May 17 00:41:37.339000 audit: BPF prog-id=19 op=UNLOAD May 17 00:41:37.339000 audit: BPF prog-id=20 op=UNLOAD May 17 00:41:37.345078 systemd[1]: Finished ldconfig.service. May 17 00:41:37.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.348809 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:41:37.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.354568 systemd[1]: Starting audit-rules.service... May 17 00:41:37.357519 systemd[1]: Starting clean-ca-certificates.service... May 17 00:41:37.365000 audit: BPF prog-id=36 op=LOAD May 17 00:41:37.368000 audit: BPF prog-id=37 op=LOAD May 17 00:41:37.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.396000 audit[1135]: SYSTEM_BOOT pid=1135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:41:37.361042 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:41:37.367987 systemd[1]: Starting systemd-resolved.service... May 17 00:41:37.373330 systemd[1]: Starting systemd-timesyncd.service... May 17 00:41:37.377081 systemd[1]: Starting systemd-update-utmp.service... May 17 00:41:37.378353 systemd[1]: Finished clean-ca-certificates.service. May 17 00:41:37.386978 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:37.389906 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:37.394179 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:37.396762 systemd[1]: Starting modprobe@loop.service... May 17 00:41:37.397642 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:37.397919 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:37.398107 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:37.401660 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:37.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.401926 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:37.408522 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:37.408811 systemd[1]: Finished modprobe@loop.service. May 17 00:41:37.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.410011 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:37.413518 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:37.416488 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:37.420262 systemd[1]: Starting modprobe@loop.service... May 17 00:41:37.420848 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:37.421064 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:37.421214 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:37.423157 systemd[1]: Finished systemd-update-utmp.service. May 17 00:41:37.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.424517 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:37.424692 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:37.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.435326 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:37.438387 systemd[1]: Starting modprobe@drm.service... May 17 00:41:37.441525 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:37.442250 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:37.442509 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:37.444980 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:41:37.445697 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:37.450633 systemd[1]: Finished ensure-sysext.service. May 17 00:41:37.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.464349 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:37.464580 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:37.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.466037 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:37.466255 systemd[1]: Finished modprobe@loop.service. May 17 00:41:37.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.467055 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:37.474657 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:37.474922 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:37.475672 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:37.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.476479 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:41:37.476697 systemd[1]: Finished modprobe@drm.service. May 17 00:41:37.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.490943 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:41:37.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.494226 systemd[1]: Starting systemd-update-done.service... May 17 00:41:37.517975 systemd[1]: Finished systemd-update-done.service. May 17 00:41:37.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:37.550000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:41:37.550000 audit[1156]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe2ee1510 a2=420 a3=0 items=0 ppid=1127 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.550000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:41:37.552390 augenrules[1156]: No rules May 17 00:41:37.552618 systemd[1]: Finished audit-rules.service. May 17 00:41:37.559026 systemd-networkd[1001]: eth1: Gained IPv6LL May 17 00:41:37.564851 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:41:37.567488 systemd[1]: Started systemd-timesyncd.service. May 17 00:41:37.568288 systemd[1]: Reached target time-set.target. May 17 00:41:37.579587 systemd-resolved[1131]: Positive Trust Anchors: May 17 00:41:37.579616 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:41:37.579664 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:41:37.589162 systemd-resolved[1131]: Using system hostname 'ci-3510.3.7-n-c83c2ac4fc'. May 17 00:41:37.592426 systemd[1]: Started systemd-resolved.service. May 17 00:41:37.593114 systemd[1]: Reached target network.target. May 17 00:41:37.593564 systemd[1]: Reached target network-online.target. May 17 00:41:37.593908 systemd[1]: Reached target nss-lookup.target. May 17 00:41:37.594235 systemd[1]: Reached target sysinit.target. May 17 00:41:37.594835 systemd[1]: Started motdgen.path. May 17 00:41:37.595251 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:41:37.596177 systemd[1]: Started logrotate.timer. May 17 00:41:37.596731 systemd[1]: Started mdadm.timer. May 17 00:41:37.597087 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:41:37.597435 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:41:37.597484 systemd[1]: Reached target paths.target. May 17 00:41:37.597899 systemd[1]: Reached target timers.target. May 17 00:41:37.598762 systemd[1]: Listening on dbus.socket. May 17 00:41:37.601030 systemd[1]: Starting docker.socket... May 17 00:41:37.607089 systemd[1]: Listening on sshd.socket. May 17 00:41:37.607814 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:37.608804 systemd[1]: Listening on docker.socket. May 17 00:41:37.609353 systemd[1]: Reached target sockets.target. May 17 00:41:37.609706 systemd[1]: Reached target basic.target. May 17 00:41:37.610141 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:37.610177 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:37.612023 systemd[1]: Starting containerd.service... May 17 00:41:37.615541 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:41:37.618089 systemd[1]: Starting dbus.service... May 17 00:41:37.620623 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:41:37.623291 systemd[1]: Starting extend-filesystems.service... May 17 00:41:37.623878 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:41:37.158135 systemd-resolved[1131]: Clock change detected. Flushing caches. May 17 00:41:37.271577 systemd-journald[956]: Time jumped backwards, rotating. May 17 00:41:37.271711 jq[1169]: false May 17 00:41:37.161454 systemd[1]: Starting kubelet.service... May 17 00:41:37.165354 systemd[1]: Starting motdgen.service... May 17 00:41:37.170124 systemd[1]: Starting prepare-helm.service... May 17 00:41:37.173519 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:41:37.179221 systemd[1]: Starting sshd-keygen.service... May 17 00:41:37.186687 systemd[1]: Starting systemd-logind.service... May 17 00:41:37.187321 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:37.187532 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:41:37.282314 jq[1181]: true May 17 00:41:37.188382 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:41:37.190523 systemd[1]: Starting update-engine.service... May 17 00:41:37.296924 extend-filesystems[1170]: Found loop1 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda May 17 00:41:37.296924 extend-filesystems[1170]: Found vda1 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda2 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda3 May 17 00:41:37.296924 extend-filesystems[1170]: Found usr May 17 00:41:37.296924 extend-filesystems[1170]: Found vda4 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda6 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda7 May 17 00:41:37.296924 extend-filesystems[1170]: Found vda9 May 17 00:41:37.296924 extend-filesystems[1170]: Checking size of /dev/vda9 May 17 00:41:37.376540 tar[1187]: linux-amd64/LICENSE May 17 00:41:37.376540 tar[1187]: linux-amd64/helm May 17 00:41:37.196350 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:41:37.380635 extend-filesystems[1170]: Resized partition /dev/vda9 May 17 00:41:37.393058 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 17 00:41:37.318639 dbus-daemon[1166]: [system] SELinux support is enabled May 17 00:41:37.207128 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:41:37.416255 extend-filesystems[1217]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:41:37.429574 jq[1188]: true May 17 00:41:37.207529 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:41:37.217917 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:41:37.218156 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:41:37.222922 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:37.222980 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:37.233537 systemd-timesyncd[1134]: Contacted time server 216.177.181.129:123 (0.flatcar.pool.ntp.org). May 17 00:41:37.236844 systemd-timesyncd[1134]: Initial clock synchronization to Sat 2025-05-17 00:41:37.158032 UTC. May 17 00:41:37.319058 systemd[1]: Started dbus.service. May 17 00:41:37.322521 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:41:37.322555 systemd[1]: Reached target system-config.target. May 17 00:41:37.323136 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:41:37.323167 systemd[1]: Reached target user-config.target. May 17 00:41:37.341778 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:41:37.342004 systemd[1]: Finished motdgen.service. May 17 00:41:37.410455 systemd-networkd[1001]: eth0: Gained IPv6LL May 17 00:41:37.442277 update_engine[1179]: I0517 00:41:37.440881 1179 main.cc:92] Flatcar Update Engine starting May 17 00:41:37.457116 update_engine[1179]: I0517 00:41:37.446334 1179 update_check_scheduler.cc:74] Next update check in 10m58s May 17 00:41:37.446302 systemd[1]: Started update-engine.service. May 17 00:41:37.449993 systemd[1]: Started locksmithd.service. May 17 00:41:37.467267 bash[1221]: Updated "/home/core/.ssh/authorized_keys" May 17 00:41:37.468430 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:41:37.499412 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 17 00:41:37.510139 systemd-logind[1177]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:41:37.510180 systemd-logind[1177]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:41:37.510564 systemd-logind[1177]: New seat seat0. May 17 00:41:37.513697 systemd[1]: Started systemd-logind.service. May 17 00:41:37.515841 extend-filesystems[1217]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:41:37.515841 extend-filesystems[1217]: old_desc_blocks = 1, new_desc_blocks = 8 May 17 00:41:37.515841 extend-filesystems[1217]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 17 00:41:37.518530 extend-filesystems[1170]: Resized filesystem in /dev/vda9 May 17 00:41:37.518530 extend-filesystems[1170]: Found vdb May 17 00:41:37.516897 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:41:37.517117 systemd[1]: Finished extend-filesystems.service. May 17 00:41:37.557508 env[1189]: time="2025-05-17T00:41:37.557423677Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:41:37.594879 coreos-metadata[1165]: May 17 00:41:37.594 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:41:37.607697 coreos-metadata[1165]: May 17 00:41:37.607 INFO Fetch successful May 17 00:41:37.614773 env[1189]: time="2025-05-17T00:41:37.614665576Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:41:37.615026 env[1189]: time="2025-05-17T00:41:37.614934782Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.618153 unknown[1165]: wrote ssh authorized keys file for user: core May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.618855513Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.618916751Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619304611Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619341010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619363903Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619381988Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619531424Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619788978Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619961463Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:37.621227 env[1189]: time="2025-05-17T00:41:37.619977592Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:41:37.621963 env[1189]: time="2025-05-17T00:41:37.620040190Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:41:37.621963 env[1189]: time="2025-05-17T00:41:37.620055083Z" level=info msg="metadata content store policy set" policy=shared May 17 00:41:37.633572 env[1189]: time="2025-05-17T00:41:37.633492608Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:41:37.633572 env[1189]: time="2025-05-17T00:41:37.633558814Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:41:37.633572 env[1189]: time="2025-05-17T00:41:37.633575839Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633619735Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633637840Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633658360Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633672437Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633686721Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633706153Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633728960Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633763809Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:41:37.633879 env[1189]: time="2025-05-17T00:41:37.633785080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:41:37.634104 env[1189]: time="2025-05-17T00:41:37.633954380Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:41:37.634104 env[1189]: time="2025-05-17T00:41:37.634075067Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634434568Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634507530Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634534492Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634605662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634620213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634635919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634647730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634659505Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634672458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634683699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634695172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634710920Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634913994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634933238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635193 env[1189]: time="2025-05-17T00:41:37.634951118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:41:37.635975 env[1189]: time="2025-05-17T00:41:37.634969641Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:41:37.635975 env[1189]: time="2025-05-17T00:41:37.634994964Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:41:37.635975 env[1189]: time="2025-05-17T00:41:37.635012107Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:41:37.635975 env[1189]: time="2025-05-17T00:41:37.635034625Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:41:37.637299 env[1189]: time="2025-05-17T00:41:37.635076197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:41:37.637477 env[1189]: time="2025-05-17T00:41:37.636621093Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:41:37.637477 env[1189]: time="2025-05-17T00:41:37.636698661Z" level=info msg="Connect containerd service" May 17 00:41:37.637477 env[1189]: time="2025-05-17T00:41:37.636751542Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:41:37.640910 env[1189]: time="2025-05-17T00:41:37.638476021Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:41:37.640910 env[1189]: time="2025-05-17T00:41:37.639237450Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:41:37.640910 env[1189]: time="2025-05-17T00:41:37.639327795Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:41:37.639548 systemd[1]: Started containerd.service. May 17 00:41:37.641225 env[1189]: time="2025-05-17T00:41:37.641138938Z" level=info msg="containerd successfully booted in 0.091463s" May 17 00:41:37.643514 update-ssh-keys[1229]: Updated "/home/core/.ssh/authorized_keys" May 17 00:41:37.642513 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:41:37.647035 env[1189]: time="2025-05-17T00:41:37.646942888Z" level=info msg="Start subscribing containerd event" May 17 00:41:37.647226 env[1189]: time="2025-05-17T00:41:37.647075132Z" level=info msg="Start recovering state" May 17 00:41:37.648726 env[1189]: time="2025-05-17T00:41:37.648629583Z" level=info msg="Start event monitor" May 17 00:41:37.670553 env[1189]: time="2025-05-17T00:41:37.670052016Z" level=info msg="Start snapshots syncer" May 17 00:41:37.670553 env[1189]: time="2025-05-17T00:41:37.670118250Z" level=info msg="Start cni network conf syncer for default" May 17 00:41:37.670553 env[1189]: time="2025-05-17T00:41:37.670131760Z" level=info msg="Start streaming server" May 17 00:41:38.464311 systemd[1]: Created slice system-sshd.slice. May 17 00:41:38.485159 tar[1187]: linux-amd64/README.md May 17 00:41:38.500543 systemd[1]: Finished prepare-helm.service. May 17 00:41:38.621234 locksmithd[1222]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:41:39.037286 systemd[1]: Started kubelet.service. May 17 00:41:39.632574 sshd_keygen[1195]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:41:39.673475 systemd[1]: Finished sshd-keygen.service. May 17 00:41:39.676798 systemd[1]: Starting issuegen.service... May 17 00:41:39.682399 systemd[1]: Started sshd@0-137.184.231.134:22-147.75.109.163:40688.service. May 17 00:41:39.695702 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:41:39.695981 systemd[1]: Finished issuegen.service. May 17 00:41:39.699487 systemd[1]: Starting systemd-user-sessions.service... May 17 00:41:39.718126 systemd[1]: Finished systemd-user-sessions.service. May 17 00:41:39.721523 systemd[1]: Started getty@tty1.service. May 17 00:41:39.725492 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:41:39.726851 systemd[1]: Reached target getty.target. May 17 00:41:39.727684 systemd[1]: Reached target multi-user.target. May 17 00:41:39.730767 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:41:39.753104 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:41:39.753386 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:41:39.754076 systemd[1]: Startup finished in 922ms (kernel) + 5.526s (initrd) + 8.898s (userspace) = 15.347s. May 17 00:41:39.801987 sshd[1252]: Accepted publickey for core from 147.75.109.163 port 40688 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:39.806869 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:39.827143 systemd[1]: Created slice user-500.slice. May 17 00:41:39.829704 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:41:39.842972 systemd-logind[1177]: New session 1 of user core. May 17 00:41:39.849245 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:41:39.851324 systemd[1]: Starting user@500.service... May 17 00:41:39.858393 (systemd)[1262]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:39.909643 kubelet[1238]: E0517 00:41:39.909511 1238 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:39.914166 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:39.914365 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:39.914746 systemd[1]: kubelet.service: Consumed 1.447s CPU time. May 17 00:41:39.994953 systemd[1262]: Queued start job for default target default.target. May 17 00:41:39.995955 systemd[1262]: Reached target paths.target. May 17 00:41:39.995993 systemd[1262]: Reached target sockets.target. May 17 00:41:39.996014 systemd[1262]: Reached target timers.target. May 17 00:41:39.996033 systemd[1262]: Reached target basic.target. May 17 00:41:39.996114 systemd[1262]: Reached target default.target. May 17 00:41:39.996164 systemd[1262]: Startup finished in 124ms. May 17 00:41:39.996277 systemd[1]: Started user@500.service. May 17 00:41:39.998164 systemd[1]: Started session-1.scope. May 17 00:41:40.077463 systemd[1]: Started sshd@1-137.184.231.134:22-147.75.109.163:40702.service. May 17 00:41:40.130577 sshd[1271]: Accepted publickey for core from 147.75.109.163 port 40702 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.132999 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:40.140770 systemd[1]: Started session-2.scope. May 17 00:41:40.141203 systemd-logind[1177]: New session 2 of user core. May 17 00:41:40.211333 sshd[1271]: pam_unix(sshd:session): session closed for user core May 17 00:41:40.218157 systemd[1]: sshd@1-137.184.231.134:22-147.75.109.163:40702.service: Deactivated successfully. May 17 00:41:40.219135 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:41:40.219978 systemd-logind[1177]: Session 2 logged out. Waiting for processes to exit. May 17 00:41:40.221833 systemd[1]: Started sshd@2-137.184.231.134:22-147.75.109.163:40718.service. May 17 00:41:40.224600 systemd-logind[1177]: Removed session 2. May 17 00:41:40.282472 sshd[1277]: Accepted publickey for core from 147.75.109.163 port 40718 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.285518 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:40.293232 systemd-logind[1177]: New session 3 of user core. May 17 00:41:40.293750 systemd[1]: Started session-3.scope. May 17 00:41:40.356804 sshd[1277]: pam_unix(sshd:session): session closed for user core May 17 00:41:40.362781 systemd[1]: sshd@2-137.184.231.134:22-147.75.109.163:40718.service: Deactivated successfully. May 17 00:41:40.363978 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:41:40.365038 systemd-logind[1177]: Session 3 logged out. Waiting for processes to exit. May 17 00:41:40.367381 systemd[1]: Started sshd@3-137.184.231.134:22-147.75.109.163:40720.service. May 17 00:41:40.369684 systemd-logind[1177]: Removed session 3. May 17 00:41:40.427275 sshd[1283]: Accepted publickey for core from 147.75.109.163 port 40720 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.430580 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:40.438938 systemd[1]: Started session-4.scope. May 17 00:41:40.439877 systemd-logind[1177]: New session 4 of user core. May 17 00:41:40.510385 sshd[1283]: pam_unix(sshd:session): session closed for user core May 17 00:41:40.520037 systemd[1]: Started sshd@4-137.184.231.134:22-147.75.109.163:40730.service. May 17 00:41:40.521038 systemd[1]: sshd@3-137.184.231.134:22-147.75.109.163:40720.service: Deactivated successfully. May 17 00:41:40.522246 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:41:40.524746 systemd-logind[1177]: Session 4 logged out. Waiting for processes to exit. May 17 00:41:40.526849 systemd-logind[1177]: Removed session 4. May 17 00:41:40.579535 sshd[1288]: Accepted publickey for core from 147.75.109.163 port 40730 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.581701 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:40.589323 systemd-logind[1177]: New session 5 of user core. May 17 00:41:40.589523 systemd[1]: Started session-5.scope. May 17 00:41:40.668125 sudo[1292]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:41:40.669214 sudo[1292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:40.679656 dbus-daemon[1166]: ЭP\xcd\xd0U: received setenforce notice (enforcing=-2141141648) May 17 00:41:40.682267 sudo[1292]: pam_unix(sudo:session): session closed for user root May 17 00:41:40.687384 sshd[1288]: pam_unix(sshd:session): session closed for user core May 17 00:41:40.693584 systemd[1]: sshd@4-137.184.231.134:22-147.75.109.163:40730.service: Deactivated successfully. May 17 00:41:40.694476 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:41:40.695391 systemd-logind[1177]: Session 5 logged out. Waiting for processes to exit. May 17 00:41:40.697559 systemd[1]: Started sshd@5-137.184.231.134:22-147.75.109.163:40744.service. May 17 00:41:40.698983 systemd-logind[1177]: Removed session 5. May 17 00:41:40.757735 sshd[1296]: Accepted publickey for core from 147.75.109.163 port 40744 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.760668 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:40.768425 systemd[1]: Started session-6.scope. May 17 00:41:40.769024 systemd-logind[1177]: New session 6 of user core. May 17 00:41:40.835534 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:41:40.836300 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:40.841204 sudo[1300]: pam_unix(sudo:session): session closed for user root May 17 00:41:40.850721 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:41:40.851126 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:40.865208 systemd[1]: Stopping audit-rules.service... May 17 00:41:40.867000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:40.869776 kernel: kauditd_printk_skb: 181 callbacks suppressed May 17 00:41:40.869922 kernel: audit: type=1305 audit(1747442500.867:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:40.869944 kernel: audit: type=1300 audit(1747442500.867:218): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0071bb40 a2=420 a3=0 items=0 ppid=1 pid=1303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.867000 audit[1303]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0071bb40 a2=420 a3=0 items=0 ppid=1 pid=1303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.873201 kernel: audit: type=1327 audit(1747442500.867:218): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:40.867000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:40.873382 auditctl[1303]: No rules May 17 00:41:40.874098 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:41:40.874387 systemd[1]: Stopped audit-rules.service. May 17 00:41:40.879789 kernel: audit: type=1131 audit(1747442500.874:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.878501 systemd[1]: Starting audit-rules.service... May 17 00:41:40.907805 augenrules[1320]: No rules May 17 00:41:40.909323 systemd[1]: Finished audit-rules.service. May 17 00:41:40.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.910000 audit[1299]: USER_END pid=1299 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:40.911484 sudo[1299]: pam_unix(sudo:session): session closed for user root May 17 00:41:40.916352 kernel: audit: type=1130 audit(1747442500.909:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.916451 kernel: audit: type=1106 audit(1747442500.910:221): pid=1299 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:40.917288 sshd[1296]: pam_unix(sshd:session): session closed for user core May 17 00:41:40.910000 audit[1299]: CRED_DISP pid=1299 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:40.918000 audit[1296]: USER_END pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.925271 kernel: audit: type=1104 audit(1747442500.910:222): pid=1299 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:40.925368 kernel: audit: type=1106 audit(1747442500.918:223): pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.925389 kernel: audit: type=1104 audit(1747442500.918:224): pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.918000 audit[1296]: CRED_DISP pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.926576 systemd[1]: sshd@5-137.184.231.134:22-147.75.109.163:40744.service: Deactivated successfully. May 17 00:41:40.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-137.184.231.134:22-147.75.109.163:40744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.928813 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:41:40.932485 systemd-logind[1177]: Session 6 logged out. Waiting for processes to exit. May 17 00:41:40.933468 kernel: audit: type=1131 audit(1747442500.924:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-137.184.231.134:22-147.75.109.163:40744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.231.134:22-147.75.109.163:40752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.934604 systemd[1]: Started sshd@6-137.184.231.134:22-147.75.109.163:40752.service. May 17 00:41:40.937927 systemd-logind[1177]: Removed session 6. May 17 00:41:40.990000 audit[1326]: USER_ACCT pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.991278 sshd[1326]: Accepted publickey for core from 147.75.109.163 port 40752 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:41:40.992000 audit[1326]: CRED_ACQ pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:40.993000 audit[1326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4497dee0 a2=3 a3=0 items=0 ppid=1 pid=1326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:40.994140 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:41.001159 systemd[1]: Started session-7.scope. May 17 00:41:41.002385 systemd-logind[1177]: New session 7 of user core. May 17 00:41:41.009000 audit[1326]: USER_START pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:41.011000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:41.069000 audit[1329]: USER_ACCT pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:41.069000 audit[1329]: CRED_REFR pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:41.069539 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:41:41.069935 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:41.072000 audit[1329]: USER_START pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:41.120362 systemd[1]: Starting docker.service... May 17 00:41:41.186900 env[1339]: time="2025-05-17T00:41:41.186840216Z" level=info msg="Starting up" May 17 00:41:41.189565 env[1339]: time="2025-05-17T00:41:41.189515567Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:41:41.189565 env[1339]: time="2025-05-17T00:41:41.189553470Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:41:41.189748 env[1339]: time="2025-05-17T00:41:41.189580079Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:41:41.189748 env[1339]: time="2025-05-17T00:41:41.189596213Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:41:41.192734 env[1339]: time="2025-05-17T00:41:41.192669482Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:41:41.192734 env[1339]: time="2025-05-17T00:41:41.192706252Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:41:41.192734 env[1339]: time="2025-05-17T00:41:41.192736798Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:41:41.192997 env[1339]: time="2025-05-17T00:41:41.192752942Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:41:41.202555 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2854054951-merged.mount: Deactivated successfully. May 17 00:41:41.250678 env[1339]: time="2025-05-17T00:41:41.250630039Z" level=info msg="Loading containers: start." May 17 00:41:41.348000 audit[1369]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.348000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe3570f260 a2=0 a3=7ffe3570f24c items=0 ppid=1339 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:41:41.353000 audit[1371]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.353000 audit[1371]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcdf917ed0 a2=0 a3=7ffcdf917ebc items=0 ppid=1339 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:41:41.356000 audit[1373]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.356000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd392b68a0 a2=0 a3=7ffd392b688c items=0 ppid=1339 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:41:41.360000 audit[1375]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.360000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdd20851f0 a2=0 a3=7ffdd20851dc items=0 ppid=1339 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:41:41.364000 audit[1377]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.364000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcfd44f470 a2=0 a3=7ffcfd44f45c items=0 ppid=1339 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:41:41.387000 audit[1382]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.387000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda46635c0 a2=0 a3=7ffda46635ac items=0 ppid=1339 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:41:41.396000 audit[1384]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.396000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcb74b7700 a2=0 a3=7ffcb74b76ec items=0 ppid=1339 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:41:41.400000 audit[1386]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.400000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd3546f4a0 a2=0 a3=7ffd3546f48c items=0 ppid=1339 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.400000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:41:41.403000 audit[1388]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.403000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff74951420 a2=0 a3=7fff7495140c items=0 ppid=1339 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:41.414000 audit[1392]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.414000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe925a5c70 a2=0 a3=7ffe925a5c5c items=0 ppid=1339 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:41.419000 audit[1393]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.419000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe29c61ee0 a2=0 a3=7ffe29c61ecc items=0 ppid=1339 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.419000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:41.436222 kernel: Initializing XFRM netlink socket May 17 00:41:41.490037 env[1339]: time="2025-05-17T00:41:41.489929431Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:41:41.529000 audit[1401]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.529000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeab480470 a2=0 a3=7ffeab48045c items=0 ppid=1339 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:41:41.542000 audit[1404]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.542000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffe1a623a0 a2=0 a3=7fffe1a6238c items=0 ppid=1339 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.542000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:41:41.547000 audit[1407]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.547000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc5e4df5b0 a2=0 a3=7ffc5e4df59c items=0 ppid=1339 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.547000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:41:41.551000 audit[1409]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.551000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb91cf170 a2=0 a3=7ffdb91cf15c items=0 ppid=1339 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.551000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:41:41.555000 audit[1411]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.555000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff96e332d0 a2=0 a3=7fff96e332bc items=0 ppid=1339 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.555000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:41:41.558000 audit[1413]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.558000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1f2a8180 a2=0 a3=7ffd1f2a816c items=0 ppid=1339 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.558000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:41:41.561000 audit[1415]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.561000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffce016d1d0 a2=0 a3=7ffce016d1bc items=0 ppid=1339 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.561000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:41:41.578000 audit[1418]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.578000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe6ef69350 a2=0 a3=7ffe6ef6933c items=0 ppid=1339 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:41:41.583000 audit[1420]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.583000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcb10c25c0 a2=0 a3=7ffcb10c25ac items=0 ppid=1339 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:41:41.587000 audit[1422]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.587000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe03e1fea0 a2=0 a3=7ffe03e1fe8c items=0 ppid=1339 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:41:41.591000 audit[1424]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.591000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde9144350 a2=0 a3=7ffde914433c items=0 ppid=1339 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:41:41.592906 systemd-networkd[1001]: docker0: Link UP May 17 00:41:41.603000 audit[1428]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.603000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeeccfaf80 a2=0 a3=7ffeeccfaf6c items=0 ppid=1339 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:41.609000 audit[1429]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:41.609000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff1e862460 a2=0 a3=7fff1e86244c items=0 ppid=1339 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:41.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:41.610347 env[1339]: time="2025-05-17T00:41:41.610297634Z" level=info msg="Loading containers: done." May 17 00:41:41.627934 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1708120198-merged.mount: Deactivated successfully. May 17 00:41:41.630859 env[1339]: time="2025-05-17T00:41:41.630808044Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:41:41.631553 env[1339]: time="2025-05-17T00:41:41.631503270Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:41:41.631911 env[1339]: time="2025-05-17T00:41:41.631891060Z" level=info msg="Daemon has completed initialization" May 17 00:41:41.654479 systemd[1]: Started docker.service. May 17 00:41:41.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:41.665887 env[1339]: time="2025-05-17T00:41:41.665785034Z" level=info msg="API listen on /run/docker.sock" May 17 00:41:41.698043 systemd[1]: Starting coreos-metadata.service... May 17 00:41:41.756668 coreos-metadata[1457]: May 17 00:41:41.756 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:41:41.770619 coreos-metadata[1457]: May 17 00:41:41.770 INFO Fetch successful May 17 00:41:41.786577 systemd[1]: Finished coreos-metadata.service. May 17 00:41:41.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:42.693735 env[1189]: time="2025-05-17T00:41:42.693660111Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:41:43.176069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4240401567.mount: Deactivated successfully. May 17 00:41:45.504517 env[1189]: time="2025-05-17T00:41:45.504395005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.509462 env[1189]: time="2025-05-17T00:41:45.509401642Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.515220 env[1189]: time="2025-05-17T00:41:45.515051534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.533450 env[1189]: time="2025-05-17T00:41:45.532829048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.537437 env[1189]: time="2025-05-17T00:41:45.537355048Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66\"" May 17 00:41:45.539882 env[1189]: time="2025-05-17T00:41:45.539817649Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:41:47.545685 env[1189]: time="2025-05-17T00:41:47.545593663Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.548487 env[1189]: time="2025-05-17T00:41:47.548412118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.552427 env[1189]: time="2025-05-17T00:41:47.552362085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.554590 env[1189]: time="2025-05-17T00:41:47.553955561Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.555587 env[1189]: time="2025-05-17T00:41:47.555436434Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4\"" May 17 00:41:47.557587 env[1189]: time="2025-05-17T00:41:47.557536065Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:41:49.055288 env[1189]: time="2025-05-17T00:41:49.055229994Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:49.058425 env[1189]: time="2025-05-17T00:41:49.058369085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:49.061665 env[1189]: time="2025-05-17T00:41:49.061616592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:49.064845 env[1189]: time="2025-05-17T00:41:49.064793293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:49.066404 env[1189]: time="2025-05-17T00:41:49.066347745Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49\"" May 17 00:41:49.068349 env[1189]: time="2025-05-17T00:41:49.068285063Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:41:50.165412 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:41:50.173168 kernel: kauditd_printk_skb: 85 callbacks suppressed May 17 00:41:50.176398 kernel: audit: type=1130 audit(1747442510.165:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.176453 kernel: audit: type=1131 audit(1747442510.165:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.165618 systemd[1]: Stopped kubelet.service. May 17 00:41:50.165704 systemd[1]: kubelet.service: Consumed 1.447s CPU time. May 17 00:41:50.169935 systemd[1]: Starting kubelet.service... May 17 00:41:50.297508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1715312573.mount: Deactivated successfully. May 17 00:41:50.390848 systemd[1]: Started kubelet.service. May 17 00:41:50.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.394252 kernel: audit: type=1130 audit(1747442510.391:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.478910 kubelet[1481]: E0517 00:41:50.478104 1481 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:50.481754 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:50.481896 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:50.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:50.485249 kernel: audit: type=1131 audit(1747442510.481:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:51.320581 env[1189]: time="2025-05-17T00:41:51.320509442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:51.326667 env[1189]: time="2025-05-17T00:41:51.326604105Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:51.340978 env[1189]: time="2025-05-17T00:41:51.340775321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:51.343761 env[1189]: time="2025-05-17T00:41:51.343688784Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:51.344865 env[1189]: time="2025-05-17T00:41:51.344790588Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:41:51.346668 env[1189]: time="2025-05-17T00:41:51.346609758Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:41:51.766363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2703356153.mount: Deactivated successfully. May 17 00:41:53.229374 env[1189]: time="2025-05-17T00:41:53.229295447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.231450 env[1189]: time="2025-05-17T00:41:53.231390049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.233601 env[1189]: time="2025-05-17T00:41:53.233554728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.235658 env[1189]: time="2025-05-17T00:41:53.235608966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.236804 env[1189]: time="2025-05-17T00:41:53.236742632Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" May 17 00:41:53.237425 env[1189]: time="2025-05-17T00:41:53.237397181Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:41:53.863095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2600913809.mount: Deactivated successfully. May 17 00:41:53.869982 env[1189]: time="2025-05-17T00:41:53.869863045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.872529 env[1189]: time="2025-05-17T00:41:53.872465522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.874257 env[1189]: time="2025-05-17T00:41:53.874201681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.876113 env[1189]: time="2025-05-17T00:41:53.876057073Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:53.876765 env[1189]: time="2025-05-17T00:41:53.876697061Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:41:53.877648 env[1189]: time="2025-05-17T00:41:53.877611915Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:41:56.933346 env[1189]: time="2025-05-17T00:41:56.933270526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.936822 env[1189]: time="2025-05-17T00:41:56.936747705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.943333 env[1189]: time="2025-05-17T00:41:56.943266637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.945680 env[1189]: time="2025-05-17T00:41:56.945618130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.946670 env[1189]: time="2025-05-17T00:41:56.946598698Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" May 17 00:42:00.307400 systemd[1]: Stopped kubelet.service. May 17 00:42:00.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:00.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:00.312769 systemd[1]: Starting kubelet.service... May 17 00:42:00.313706 kernel: audit: type=1130 audit(1747442520.308:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:00.313850 kernel: audit: type=1131 audit(1747442520.308:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:00.350791 systemd[1]: Reloading. May 17 00:42:00.462415 /usr/lib/systemd/system-generators/torcx-generator[1534]: time="2025-05-17T00:42:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:00.462446 /usr/lib/systemd/system-generators/torcx-generator[1534]: time="2025-05-17T00:42:00Z" level=info msg="torcx already run" May 17 00:42:00.624698 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:00.625062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:00.654257 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794572 kernel: audit: type=1400 audit(1747442520.787:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794765 kernel: audit: type=1400 audit(1747442520.787:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794819 kernel: audit: type=1400 audit(1747442520.787:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.800888 kernel: audit: type=1400 audit(1747442520.787:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.801063 kernel: audit: type=1400 audit(1747442520.787:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.807311 kernel: audit: type=1400 audit(1747442520.787:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.807523 kernel: audit: type=1400 audit(1747442520.787:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.810364 kernel: audit: type=1400 audit(1747442520.787:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit: BPF prog-id=43 op=LOAD May 17 00:42:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.797000 audit: BPF prog-id=44 op=LOAD May 17 00:42:00.797000 audit: BPF prog-id=27 op=UNLOAD May 17 00:42:00.797000 audit: BPF prog-id=28 op=UNLOAD May 17 00:42:00.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.803000 audit: BPF prog-id=45 op=LOAD May 17 00:42:00.804000 audit: BPF prog-id=41 op=UNLOAD May 17 00:42:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.810000 audit: BPF prog-id=46 op=LOAD May 17 00:42:00.810000 audit: BPF prog-id=29 op=UNLOAD May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit: BPF prog-id=47 op=LOAD May 17 00:42:00.817000 audit: BPF prog-id=30 op=UNLOAD May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit: BPF prog-id=48 op=LOAD May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.817000 audit: BPF prog-id=49 op=LOAD May 17 00:42:00.817000 audit: BPF prog-id=31 op=UNLOAD May 17 00:42:00.817000 audit: BPF prog-id=32 op=UNLOAD May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit: BPF prog-id=50 op=LOAD May 17 00:42:00.819000 audit: BPF prog-id=38 op=UNLOAD May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit: BPF prog-id=51 op=LOAD May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.819000 audit: BPF prog-id=52 op=LOAD May 17 00:42:00.819000 audit: BPF prog-id=39 op=UNLOAD May 17 00:42:00.819000 audit: BPF prog-id=40 op=UNLOAD May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit: BPF prog-id=53 op=LOAD May 17 00:42:00.820000 audit: BPF prog-id=33 op=UNLOAD May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit: BPF prog-id=54 op=LOAD May 17 00:42:00.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.821000 audit: BPF prog-id=55 op=LOAD May 17 00:42:00.821000 audit: BPF prog-id=34 op=UNLOAD May 17 00:42:00.821000 audit: BPF prog-id=35 op=UNLOAD May 17 00:42:00.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.823000 audit: BPF prog-id=56 op=LOAD May 17 00:42:00.823000 audit: BPF prog-id=36 op=UNLOAD May 17 00:42:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:00.824000 audit: BPF prog-id=57 op=LOAD May 17 00:42:00.824000 audit: BPF prog-id=37 op=UNLOAD May 17 00:42:00.867195 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:42:00.867526 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:42:00.868153 systemd[1]: Stopped kubelet.service. May 17 00:42:00.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:42:00.872860 systemd[1]: Starting kubelet.service... May 17 00:42:01.030880 systemd[1]: Started kubelet.service. May 17 00:42:01.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:01.136957 kubelet[1586]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:01.137652 kubelet[1586]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:42:01.137721 kubelet[1586]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:01.138091 kubelet[1586]: I0517 00:42:01.138028 1586 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:42:02.041428 kubelet[1586]: I0517 00:42:02.041343 1586 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:42:02.041428 kubelet[1586]: I0517 00:42:02.041418 1586 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:42:02.042442 kubelet[1586]: I0517 00:42:02.042396 1586 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:42:02.091295 kubelet[1586]: E0517 00:42:02.091221 1586 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://137.184.231.134:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:42:02.092074 kubelet[1586]: I0517 00:42:02.092021 1586 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:42:02.103132 kubelet[1586]: E0517 00:42:02.103076 1586 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:42:02.103436 kubelet[1586]: I0517 00:42:02.103408 1586 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:42:02.110059 kubelet[1586]: I0517 00:42:02.110004 1586 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:42:02.110872 kubelet[1586]: I0517 00:42:02.110804 1586 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:42:02.111391 kubelet[1586]: I0517 00:42:02.111023 1586 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-c83c2ac4fc","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:42:02.111815 kubelet[1586]: I0517 00:42:02.111788 1586 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:42:02.111944 kubelet[1586]: I0517 00:42:02.111925 1586 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:42:02.112315 kubelet[1586]: I0517 00:42:02.112292 1586 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:02.116059 kubelet[1586]: I0517 00:42:02.116001 1586 kubelet.go:480] "Attempting to sync node with API server" May 17 00:42:02.116504 kubelet[1586]: I0517 00:42:02.116441 1586 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:42:02.116643 kubelet[1586]: I0517 00:42:02.116523 1586 kubelet.go:386] "Adding apiserver pod source" May 17 00:42:02.116643 kubelet[1586]: I0517 00:42:02.116552 1586 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:42:02.120663 kubelet[1586]: E0517 00:42:02.120588 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://137.184.231.134:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-c83c2ac4fc&limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:42:02.141773 kubelet[1586]: E0517 00:42:02.141712 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://137.184.231.134:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:42:02.142636 kubelet[1586]: I0517 00:42:02.142606 1586 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:42:02.143701 kubelet[1586]: I0517 00:42:02.143656 1586 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:42:02.145961 kubelet[1586]: W0517 00:42:02.145896 1586 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:42:02.153398 kubelet[1586]: I0517 00:42:02.153218 1586 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:42:02.153398 kubelet[1586]: I0517 00:42:02.153344 1586 server.go:1289] "Started kubelet" May 17 00:42:02.157504 kubelet[1586]: I0517 00:42:02.157406 1586 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:42:02.158000 audit[1586]: AVC avc: denied { mac_admin } for pid=1586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:02.158000 audit[1586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00090d140 a1=c000a70810 a2=c00090d110 a3=25 items=0 ppid=1 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:02.158000 audit[1586]: AVC avc: denied { mac_admin } for pid=1586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:02.158000 audit[1586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b642a0 a1=c000a70828 a2=c00090d1d0 a3=25 items=0 ppid=1 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:02.159205 kubelet[1586]: I0517 00:42:02.158635 1586 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:42:02.159205 kubelet[1586]: I0517 00:42:02.158700 1586 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:42:02.159897 kubelet[1586]: I0517 00:42:02.159848 1586 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:42:02.160061 kubelet[1586]: I0517 00:42:02.159873 1586 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:42:02.160324 kubelet[1586]: I0517 00:42:02.160279 1586 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:42:02.161730 kubelet[1586]: I0517 00:42:02.161695 1586 server.go:317] "Adding debug handlers to kubelet server" May 17 00:42:02.170000 audit[1601]: NETFILTER_CFG table=mangle:26 family=10 entries=2 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:02.170000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd92b8a660 a2=0 a3=7ffd92b8a64c items=0 ppid=1586 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:42:02.174384 kubelet[1586]: I0517 00:42:02.174331 1586 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:42:02.176000 audit[1603]: NETFILTER_CFG table=mangle:27 family=2 entries=2 op=nft_register_chain pid=1603 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.176000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff358522b0 a2=0 a3=7fff3585229c items=0 ppid=1586 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:42:02.179000 audit[1604]: NETFILTER_CFG table=mangle:28 family=10 entries=1 op=nft_register_chain pid=1604 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:02.179000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb441dd50 a2=0 a3=7fffb441dd3c items=0 ppid=1586 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:42:02.180352 kubelet[1586]: I0517 00:42:02.180313 1586 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:42:02.181000 audit[1605]: NETFILTER_CFG table=nat:29 family=10 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:02.181000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca472b670 a2=0 a3=7ffca472b65c items=0 ppid=1586 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:42:02.184824 kubelet[1586]: I0517 00:42:02.184774 1586 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:42:02.185290 kubelet[1586]: E0517 00:42:02.185252 1586 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" May 17 00:42:02.185000 audit[1606]: NETFILTER_CFG table=filter:30 family=10 entries=2 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:02.185000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffddc9070c0 a2=0 a3=7ffddc9070ac items=0 ppid=1586 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.186013 kubelet[1586]: I0517 00:42:02.185890 1586 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:42:02.186013 kubelet[1586]: I0517 00:42:02.185989 1586 reconciler.go:26] "Reconciler: start to sync state" May 17 00:42:02.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:42:02.188707 kubelet[1586]: E0517 00:42:02.186744 1586 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://137.184.231.134:6443/api/v1/namespaces/default/events\": dial tcp 137.184.231.134:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-c83c2ac4fc.184029b72e5bab5b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-c83c2ac4fc,UID:ci-3510.3.7-n-c83c2ac4fc,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-c83c2ac4fc,},FirstTimestamp:2025-05-17 00:42:02.153266011 +0000 UTC m=+1.113142389,LastTimestamp:2025-05-17 00:42:02.153266011 +0000 UTC m=+1.113142389,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-c83c2ac4fc,}" May 17 00:42:02.189417 kubelet[1586]: E0517 00:42:02.189258 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://137.184.231.134:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:42:02.189588 kubelet[1586]: E0517 00:42:02.189483 1586 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.231.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-c83c2ac4fc?timeout=10s\": dial tcp 137.184.231.134:6443: connect: connection refused" interval="200ms" May 17 00:42:02.189867 kubelet[1586]: E0517 00:42:02.189823 1586 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:42:02.190816 kubelet[1586]: I0517 00:42:02.190784 1586 factory.go:223] Registration of the systemd container factory successfully May 17 00:42:02.190975 kubelet[1586]: I0517 00:42:02.190947 1586 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:42:02.191000 audit[1607]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.191000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9cdef350 a2=0 a3=7ffe9cdef33c items=0 ppid=1586 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:42:02.192703 kubelet[1586]: I0517 00:42:02.192639 1586 factory.go:223] Registration of the containerd container factory successfully May 17 00:42:02.206000 audit[1611]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.206000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe0815500 a2=0 a3=7fffe08154ec items=0 ppid=1586 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:02.208335 kubelet[1586]: I0517 00:42:02.208304 1586 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:42:02.208335 kubelet[1586]: I0517 00:42:02.208330 1586 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:42:02.208489 kubelet[1586]: I0517 00:42:02.208370 1586 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:02.211080 kubelet[1586]: I0517 00:42:02.211030 1586 policy_none.go:49] "None policy: Start" May 17 00:42:02.211080 kubelet[1586]: I0517 00:42:02.211093 1586 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:42:02.211378 kubelet[1586]: I0517 00:42:02.211119 1586 state_mem.go:35] "Initializing new in-memory state store" May 17 00:42:02.214000 audit[1613]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.214000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffddf553a40 a2=0 a3=7ffddf553a2c items=0 ppid=1586 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:02.220081 systemd[1]: Created slice kubepods.slice. May 17 00:42:02.229947 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:42:02.241697 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:42:02.243000 audit[1616]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.243000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc4e5fa840 a2=0 a3=7ffc4e5fa82c items=0 ppid=1586 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:42:02.245481 kubelet[1586]: I0517 00:42:02.245445 1586 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:42:02.247263 kubelet[1586]: I0517 00:42:02.246725 1586 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:42:02.248602 kubelet[1586]: I0517 00:42:02.248568 1586 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:42:02.248846 kubelet[1586]: I0517 00:42:02.248820 1586 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:42:02.249066 kubelet[1586]: E0517 00:42:02.249029 1586 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:42:02.252000 audit[1619]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.252000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2df68490 a2=0 a3=7ffe2df6847c items=0 ppid=1586 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:42:02.253985 kubelet[1586]: E0517 00:42:02.253943 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://137.184.231.134:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:42:02.254000 audit[1620]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.254000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc291b2320 a2=0 a3=7ffc291b230c items=0 ppid=1586 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:42:02.256987 kubelet[1586]: E0517 00:42:02.256934 1586 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:42:02.256000 audit[1586]: AVC avc: denied { mac_admin } for pid=1586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.256000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:02.256000 audit[1586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d2a7b0 a1=c000d322e8 a2=c000d2a780 a3=25 items=0 ppid=1 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.256000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:02.257659 kubelet[1586]: E0517 00:42:02.257040 1586 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:42:02.257659 kubelet[1586]: I0517 00:42:02.257279 1586 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:42:02.257659 kubelet[1586]: I0517 00:42:02.257309 1586 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:42:02.259472 kubelet[1586]: I0517 00:42:02.259352 1586 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:42:02.260993 kubelet[1586]: E0517 00:42:02.260955 1586 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:42:02.261357 kubelet[1586]: E0517 00:42:02.261330 1586 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-c83c2ac4fc\" not found" May 17 00:42:02.264000 audit[1621]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:02.264000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff4917590 a2=0 a3=7ffff491757c items=0 ppid=1586 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:42:02.360007 kubelet[1586]: I0517 00:42:02.359882 1586 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.363081 kubelet[1586]: E0517 00:42:02.363005 1586 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://137.184.231.134:6443/api/v1/nodes\": dial tcp 137.184.231.134:6443: connect: connection refused" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.371960 systemd[1]: Created slice kubepods-burstable-pod5472c5dd6974de21655ad92c6f45181a.slice. May 17 00:42:02.380725 kubelet[1586]: E0517 00:42:02.380687 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.385837 systemd[1]: Created slice kubepods-burstable-pod44f50ba19355925aefab8a27f2158896.slice. May 17 00:42:02.388595 kubelet[1586]: E0517 00:42:02.388563 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.390963 kubelet[1586]: E0517 00:42:02.390902 1586 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.231.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-c83c2ac4fc?timeout=10s\": dial tcp 137.184.231.134:6443: connect: connection refused" interval="400ms" May 17 00:42:02.394335 systemd[1]: Created slice kubepods-burstable-poda412eab595a13ac4179ffb56e0992695.slice. May 17 00:42:02.397133 kubelet[1586]: E0517 00:42:02.397083 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487099 kubelet[1586]: I0517 00:42:02.487014 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487363 kubelet[1586]: I0517 00:42:02.487138 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487363 kubelet[1586]: I0517 00:42:02.487210 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487363 kubelet[1586]: I0517 00:42:02.487257 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487363 kubelet[1586]: I0517 00:42:02.487289 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487363 kubelet[1586]: I0517 00:42:02.487321 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5472c5dd6974de21655ad92c6f45181a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"5472c5dd6974de21655ad92c6f45181a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487546 kubelet[1586]: I0517 00:42:02.487350 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487546 kubelet[1586]: I0517 00:42:02.487385 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.487546 kubelet[1586]: I0517 00:42:02.487435 1586 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.565874 kubelet[1586]: I0517 00:42:02.565383 1586 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.566309 kubelet[1586]: E0517 00:42:02.566267 1586 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://137.184.231.134:6443/api/v1/nodes\": dial tcp 137.184.231.134:6443: connect: connection refused" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.682225 kubelet[1586]: E0517 00:42:02.682091 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:02.690889 kubelet[1586]: E0517 00:42:02.690844 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:02.692261 env[1189]: time="2025-05-17T00:42:02.691731689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-c83c2ac4fc,Uid:5472c5dd6974de21655ad92c6f45181a,Namespace:kube-system,Attempt:0,}" May 17 00:42:02.695704 env[1189]: time="2025-05-17T00:42:02.695543698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-c83c2ac4fc,Uid:44f50ba19355925aefab8a27f2158896,Namespace:kube-system,Attempt:0,}" May 17 00:42:02.698680 kubelet[1586]: E0517 00:42:02.698548 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:02.699201 env[1189]: time="2025-05-17T00:42:02.699136984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc,Uid:a412eab595a13ac4179ffb56e0992695,Namespace:kube-system,Attempt:0,}" May 17 00:42:02.792600 kubelet[1586]: E0517 00:42:02.792529 1586 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.231.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-c83c2ac4fc?timeout=10s\": dial tcp 137.184.231.134:6443: connect: connection refused" interval="800ms" May 17 00:42:02.949229 kubelet[1586]: E0517 00:42:02.949047 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://137.184.231.134:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:42:02.968616 kubelet[1586]: I0517 00:42:02.968567 1586 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:02.969204 kubelet[1586]: E0517 00:42:02.969096 1586 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://137.184.231.134:6443/api/v1/nodes\": dial tcp 137.184.231.134:6443: connect: connection refused" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:03.100080 kubelet[1586]: E0517 00:42:03.099958 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://137.184.231.134:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-c83c2ac4fc&limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:42:03.106522 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount116879698.mount: Deactivated successfully. May 17 00:42:03.111065 env[1189]: time="2025-05-17T00:42:03.110973139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.112467 env[1189]: time="2025-05-17T00:42:03.112417544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.113520 env[1189]: time="2025-05-17T00:42:03.113462029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.114757 env[1189]: time="2025-05-17T00:42:03.114707956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.115978 env[1189]: time="2025-05-17T00:42:03.115929951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.118747 env[1189]: time="2025-05-17T00:42:03.118695506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.121896 env[1189]: time="2025-05-17T00:42:03.121831074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.126684 env[1189]: time="2025-05-17T00:42:03.126627243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.127373 env[1189]: time="2025-05-17T00:42:03.127337042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.128148 env[1189]: time="2025-05-17T00:42:03.128108312Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.128907 env[1189]: time="2025-05-17T00:42:03.128862872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.129574 env[1189]: time="2025-05-17T00:42:03.129536928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:03.158385 env[1189]: time="2025-05-17T00:42:03.156390100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:03.158385 env[1189]: time="2025-05-17T00:42:03.156464795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:03.158385 env[1189]: time="2025-05-17T00:42:03.156484525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:03.158385 env[1189]: time="2025-05-17T00:42:03.156666137Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c997b2ed1b9172d24bc2a5a168d63b790214d10203e5198d8cc7f6319b288124 pid=1631 runtime=io.containerd.runc.v2 May 17 00:42:03.171926 env[1189]: time="2025-05-17T00:42:03.171818850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:03.172149 env[1189]: time="2025-05-17T00:42:03.171937338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:03.172149 env[1189]: time="2025-05-17T00:42:03.171975945Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:03.172283 env[1189]: time="2025-05-17T00:42:03.172226269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14d311356c50559cfa18142769f4f39a242284ca6bd445f8bd39ca15acc76ae5 pid=1652 runtime=io.containerd.runc.v2 May 17 00:42:03.174612 env[1189]: time="2025-05-17T00:42:03.174484236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:03.174612 env[1189]: time="2025-05-17T00:42:03.174546585Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:03.174904 env[1189]: time="2025-05-17T00:42:03.174562771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:03.175527 env[1189]: time="2025-05-17T00:42:03.175459905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65143bd67c893299fd01c4a12612653e3cc375e7a9a387556d6427fc4de187ef pid=1653 runtime=io.containerd.runc.v2 May 17 00:42:03.205790 systemd[1]: Started cri-containerd-c997b2ed1b9172d24bc2a5a168d63b790214d10203e5198d8cc7f6319b288124.scope. May 17 00:42:03.230879 systemd[1]: Started cri-containerd-14d311356c50559cfa18142769f4f39a242284ca6bd445f8bd39ca15acc76ae5.scope. May 17 00:42:03.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.246000 audit: BPF prog-id=58 op=LOAD May 17 00:42:03.247991 systemd[1]: Started cri-containerd-65143bd67c893299fd01c4a12612653e3cc375e7a9a387556d6427fc4de187ef.scope. May 17 00:42:03.248000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.248000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1631 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393762326564316239313732643234626332613561313638643633 May 17 00:42:03.248000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.248000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1631 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393762326564316239313732643234626332613561313638643633 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit: BPF prog-id=59 op=LOAD May 17 00:42:03.249000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308900 items=0 ppid=1631 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393762326564316239313732643234626332613561313638643633 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit: BPF prog-id=60 op=LOAD May 17 00:42:03.249000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308948 items=0 ppid=1631 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393762326564316239313732643234626332613561313638643633 May 17 00:42:03.249000 audit: BPF prog-id=60 op=UNLOAD May 17 00:42:03.249000 audit: BPF prog-id=59 op=UNLOAD May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.249000 audit: BPF prog-id=61 op=LOAD May 17 00:42:03.249000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308d58 items=0 ppid=1631 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393762326564316239313732643234626332613561313638643633 May 17 00:42:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.276000 audit: BPF prog-id=62 op=LOAD May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1652 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643331313335366335303535396366613138313432373639663466 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1652 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643331313335366335303535396366613138313432373639663466 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit: BPF prog-id=63 op=LOAD May 17 00:42:03.277000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a2350 items=0 ppid=1652 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643331313335366335303535396366613138313432373639663466 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit: BPF prog-id=64 op=LOAD May 17 00:42:03.277000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a2398 items=0 ppid=1652 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643331313335366335303535396366613138313432373639663466 May 17 00:42:03.277000 audit: BPF prog-id=64 op=UNLOAD May 17 00:42:03.277000 audit: BPF prog-id=63 op=UNLOAD May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.277000 audit: BPF prog-id=65 op=LOAD May 17 00:42:03.277000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a27a8 items=0 ppid=1652 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643331313335366335303535396366613138313432373639663466 May 17 00:42:03.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.284000 audit: BPF prog-id=66 op=LOAD May 17 00:42:03.286000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.286000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1653 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313433626436376338393332393966643031633461313236313236 May 17 00:42:03.287000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.287000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1653 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313433626436376338393332393966643031633461313236313236 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.289000 audit: BPF prog-id=67 op=LOAD May 17 00:42:03.289000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c4eb0 items=0 ppid=1653 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313433626436376338393332393966643031633461313236313236 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.290000 audit: BPF prog-id=68 op=LOAD May 17 00:42:03.290000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c4ef8 items=0 ppid=1653 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313433626436376338393332393966643031633461313236313236 May 17 00:42:03.291000 audit: BPF prog-id=68 op=UNLOAD May 17 00:42:03.291000 audit: BPF prog-id=67 op=UNLOAD May 17 00:42:03.291000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.291000 audit: BPF prog-id=69 op=LOAD May 17 00:42:03.291000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c5308 items=0 ppid=1653 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313433626436376338393332393966643031633461313236313236 May 17 00:42:03.303122 kubelet[1586]: E0517 00:42:03.303034 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://137.184.231.134:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:42:03.313248 env[1189]: time="2025-05-17T00:42:03.313130289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-c83c2ac4fc,Uid:5472c5dd6974de21655ad92c6f45181a,Namespace:kube-system,Attempt:0,} returns sandbox id \"c997b2ed1b9172d24bc2a5a168d63b790214d10203e5198d8cc7f6319b288124\"" May 17 00:42:03.315795 kubelet[1586]: E0517 00:42:03.315262 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:03.324084 env[1189]: time="2025-05-17T00:42:03.323976605Z" level=info msg="CreateContainer within sandbox \"c997b2ed1b9172d24bc2a5a168d63b790214d10203e5198d8cc7f6319b288124\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:42:03.339544 env[1189]: time="2025-05-17T00:42:03.339465699Z" level=info msg="CreateContainer within sandbox \"c997b2ed1b9172d24bc2a5a168d63b790214d10203e5198d8cc7f6319b288124\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9a938c0709ea0c661a2485b6ac88e01bacd34b83e2a72cabae22cdb3174422a2\"" May 17 00:42:03.340695 env[1189]: time="2025-05-17T00:42:03.340637245Z" level=info msg="StartContainer for \"9a938c0709ea0c661a2485b6ac88e01bacd34b83e2a72cabae22cdb3174422a2\"" May 17 00:42:03.375715 systemd[1]: Started cri-containerd-9a938c0709ea0c661a2485b6ac88e01bacd34b83e2a72cabae22cdb3174422a2.scope. May 17 00:42:03.393743 env[1189]: time="2025-05-17T00:42:03.387623384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-c83c2ac4fc,Uid:44f50ba19355925aefab8a27f2158896,Namespace:kube-system,Attempt:0,} returns sandbox id \"65143bd67c893299fd01c4a12612653e3cc375e7a9a387556d6427fc4de187ef\"" May 17 00:42:03.401205 env[1189]: time="2025-05-17T00:42:03.397761332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc,Uid:a412eab595a13ac4179ffb56e0992695,Namespace:kube-system,Attempt:0,} returns sandbox id \"14d311356c50559cfa18142769f4f39a242284ca6bd445f8bd39ca15acc76ae5\"" May 17 00:42:03.402672 kubelet[1586]: E0517 00:42:03.402376 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:03.402672 kubelet[1586]: E0517 00:42:03.402452 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:03.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.408000 audit: BPF prog-id=70 op=LOAD May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1631 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393338633037303965613063363631613234383562366163383865 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1631 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393338633037303965613063363631613234383562366163383865 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.409000 audit: BPF prog-id=71 op=LOAD May 17 00:42:03.409000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00024b0c0 items=0 ppid=1631 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393338633037303965613063363631613234383562366163383865 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit: BPF prog-id=72 op=LOAD May 17 00:42:03.410000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00024b108 items=0 ppid=1631 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393338633037303965613063363631613234383562366163383865 May 17 00:42:03.410000 audit: BPF prog-id=72 op=UNLOAD May 17 00:42:03.410000 audit: BPF prog-id=71 op=UNLOAD May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.410000 audit: BPF prog-id=73 op=LOAD May 17 00:42:03.410000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00024b518 items=0 ppid=1631 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393338633037303965613063363631613234383562366163383865 May 17 00:42:03.420780 env[1189]: time="2025-05-17T00:42:03.414492777Z" level=info msg="CreateContainer within sandbox \"65143bd67c893299fd01c4a12612653e3cc375e7a9a387556d6427fc4de187ef\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:42:03.420780 env[1189]: time="2025-05-17T00:42:03.414828239Z" level=info msg="CreateContainer within sandbox \"14d311356c50559cfa18142769f4f39a242284ca6bd445f8bd39ca15acc76ae5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:42:03.441409 env[1189]: time="2025-05-17T00:42:03.441296635Z" level=info msg="CreateContainer within sandbox \"14d311356c50559cfa18142769f4f39a242284ca6bd445f8bd39ca15acc76ae5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6770705f76e82330e7209f9c9d5e048869c976ab556fb22feece48ab0532ff2d\"" May 17 00:42:03.450213 env[1189]: time="2025-05-17T00:42:03.450138163Z" level=info msg="StartContainer for \"6770705f76e82330e7209f9c9d5e048869c976ab556fb22feece48ab0532ff2d\"" May 17 00:42:03.455396 env[1189]: time="2025-05-17T00:42:03.455300570Z" level=info msg="CreateContainer within sandbox \"65143bd67c893299fd01c4a12612653e3cc375e7a9a387556d6427fc4de187ef\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6ab37be04784e504cc533b53ce2f4e7bd2e6898d456a9fe83cc8f92eb54080b6\"" May 17 00:42:03.456408 env[1189]: time="2025-05-17T00:42:03.456302005Z" level=info msg="StartContainer for \"6ab37be04784e504cc533b53ce2f4e7bd2e6898d456a9fe83cc8f92eb54080b6\"" May 17 00:42:03.474086 env[1189]: time="2025-05-17T00:42:03.474012735Z" level=info msg="StartContainer for \"9a938c0709ea0c661a2485b6ac88e01bacd34b83e2a72cabae22cdb3174422a2\" returns successfully" May 17 00:42:03.507306 systemd[1]: Started cri-containerd-6770705f76e82330e7209f9c9d5e048869c976ab556fb22feece48ab0532ff2d.scope. May 17 00:42:03.525295 systemd[1]: Started cri-containerd-6ab37be04784e504cc533b53ce2f4e7bd2e6898d456a9fe83cc8f92eb54080b6.scope. May 17 00:42:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.543000 audit: BPF prog-id=74 op=LOAD May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1652 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373037303566373665383233333065373230396639633964356530 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1652 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373037303566373665383233333065373230396639633964356530 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.544000 audit: BPF prog-id=75 op=LOAD May 17 00:42:03.544000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00035cc80 items=0 ppid=1652 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373037303566373665383233333065373230396639633964356530 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.545000 audit: BPF prog-id=76 op=LOAD May 17 00:42:03.545000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00035ccc8 items=0 ppid=1652 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373037303566373665383233333065373230396639633964356530 May 17 00:42:03.548000 audit: BPF prog-id=76 op=UNLOAD May 17 00:42:03.548000 audit: BPF prog-id=75 op=UNLOAD May 17 00:42:03.548000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.548000 audit: BPF prog-id=77 op=LOAD May 17 00:42:03.548000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00035d0d8 items=0 ppid=1652 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373037303566373665383233333065373230396639633964356530 May 17 00:42:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.559000 audit: BPF prog-id=78 op=LOAD May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623337626530343738346535303463633533336235336365326634 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623337626530343738346535303463633533336235336365326634 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit: BPF prog-id=79 op=LOAD May 17 00:42:03.560000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099240 items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623337626530343738346535303463633533336235336365326634 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit: BPF prog-id=80 op=LOAD May 17 00:42:03.560000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099288 items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623337626530343738346535303463633533336235336365326634 May 17 00:42:03.560000 audit: BPF prog-id=80 op=UNLOAD May 17 00:42:03.560000 audit: BPF prog-id=79 op=UNLOAD May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:03.560000 audit: BPF prog-id=81 op=LOAD May 17 00:42:03.560000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099698 items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623337626530343738346535303463633533336235336365326634 May 17 00:42:03.593614 kubelet[1586]: E0517 00:42:03.593537 1586 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.231.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-c83c2ac4fc?timeout=10s\": dial tcp 137.184.231.134:6443: connect: connection refused" interval="1.6s" May 17 00:42:03.613420 env[1189]: time="2025-05-17T00:42:03.613352606Z" level=info msg="StartContainer for \"6ab37be04784e504cc533b53ce2f4e7bd2e6898d456a9fe83cc8f92eb54080b6\" returns successfully" May 17 00:42:03.627220 env[1189]: time="2025-05-17T00:42:03.623438310Z" level=info msg="StartContainer for \"6770705f76e82330e7209f9c9d5e048869c976ab556fb22feece48ab0532ff2d\" returns successfully" May 17 00:42:03.671461 kubelet[1586]: E0517 00:42:03.671388 1586 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://137.184.231.134:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:42:03.770802 kubelet[1586]: I0517 00:42:03.770673 1586 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:03.771238 kubelet[1586]: E0517 00:42:03.771197 1586 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://137.184.231.134:6443/api/v1/nodes\": dial tcp 137.184.231.134:6443: connect: connection refused" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:04.212517 kubelet[1586]: E0517 00:42:04.212448 1586 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://137.184.231.134:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 137.184.231.134:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:42:04.263495 kubelet[1586]: E0517 00:42:04.263447 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:04.263692 kubelet[1586]: E0517 00:42:04.263665 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:04.266795 kubelet[1586]: E0517 00:42:04.266764 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:04.267135 kubelet[1586]: E0517 00:42:04.267118 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:04.268482 kubelet[1586]: E0517 00:42:04.268452 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:04.268759 kubelet[1586]: E0517 00:42:04.268741 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:05.060000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:05.060000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000048030 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:05.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:05.061000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:05.061000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003f4060 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:05.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:05.271495 kubelet[1586]: E0517 00:42:05.271452 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:05.272245 kubelet[1586]: E0517 00:42:05.271711 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:05.272454 kubelet[1586]: E0517 00:42:05.272429 1586 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:05.272852 kubelet[1586]: E0517 00:42:05.272827 1586 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:05.373667 kubelet[1586]: I0517 00:42:05.373536 1586 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.217682 kernel: kauditd_printk_skb: 562 callbacks suppressed May 17 00:42:06.217889 kernel: audit: type=1400 audit(1747442526.216:566): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.216000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.216000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.224360 kernel: audit: type=1400 audit(1747442526.216:567): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.224547 kernel: audit: type=1300 audit(1747442526.216:567): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0090f2e10 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.216000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0090f2e10 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.235889 kernel: audit: type=1327 audit(1747442526.216:567): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.236110 kernel: audit: type=1300 audit(1747442526.216:566): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004778cc0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.236253 kernel: audit: type=1327 audit(1747442526.216:566): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.216000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004778cc0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.217000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.242769 kernel: audit: type=1400 audit(1747442526.217:568): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.242943 kernel: audit: type=1300 audit(1747442526.217:568): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006df99c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.217000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006df99c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.250647 kernel: audit: type=1327 audit(1747442526.217:568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.250869 kernel: audit: type=1400 audit(1747442526.240:569): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524340 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.240000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524340 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.240000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c004778ff0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.247000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.247000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c006df9b80 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.247000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.247000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c004779440 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:42:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:42:06.462079 kubelet[1586]: E0517 00:42:06.462025 1586 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-c83c2ac4fc\" not found" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.525698 kubelet[1586]: I0517 00:42:06.525566 1586 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.526964 kubelet[1586]: E0517 00:42:06.526916 1586 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-c83c2ac4fc\": node \"ci-3510.3.7-n-c83c2ac4fc\" not found" May 17 00:42:06.586200 kubelet[1586]: I0517 00:42:06.586148 1586 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.599766 kubelet[1586]: E0517 00:42:06.599554 1586 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.600095 kubelet[1586]: I0517 00:42:06.600055 1586 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.603473 kubelet[1586]: E0517 00:42:06.603420 1586 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.603473 kubelet[1586]: I0517 00:42:06.603471 1586 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:06.607896 kubelet[1586]: E0517 00:42:06.607840 1586 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-c83c2ac4fc\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:07.125796 kubelet[1586]: I0517 00:42:07.125718 1586 apiserver.go:52] "Watching apiserver" May 17 00:42:07.186083 kubelet[1586]: I0517 00:42:07.186035 1586 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:42:09.009074 systemd[1]: Reloading. May 17 00:42:09.147000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524365 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:42:09.147000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00012e880 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:09.147000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:09.160754 /usr/lib/systemd/system-generators/torcx-generator[1884]: time="2025-05-17T00:42:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:09.162582 /usr/lib/systemd/system-generators/torcx-generator[1884]: time="2025-05-17T00:42:09Z" level=info msg="torcx already run" May 17 00:42:09.322026 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:09.322049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:09.347873 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.509000 audit: BPF prog-id=82 op=LOAD May 17 00:42:09.509000 audit: BPF prog-id=58 op=UNLOAD May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit: BPF prog-id=83 op=LOAD May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.510000 audit: BPF prog-id=84 op=LOAD May 17 00:42:09.510000 audit: BPF prog-id=43 op=UNLOAD May 17 00:42:09.510000 audit: BPF prog-id=44 op=UNLOAD May 17 00:42:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.512000 audit: BPF prog-id=85 op=LOAD May 17 00:42:09.512000 audit: BPF prog-id=45 op=UNLOAD May 17 00:42:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.513000 audit: BPF prog-id=86 op=LOAD May 17 00:42:09.513000 audit: BPF prog-id=46 op=UNLOAD May 17 00:42:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.514000 audit: BPF prog-id=87 op=LOAD May 17 00:42:09.514000 audit: BPF prog-id=62 op=UNLOAD May 17 00:42:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.516000 audit: BPF prog-id=88 op=LOAD May 17 00:42:09.516000 audit: BPF prog-id=78 op=UNLOAD May 17 00:42:09.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.517000 audit: BPF prog-id=89 op=LOAD May 17 00:42:09.517000 audit: BPF prog-id=74 op=UNLOAD May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit: BPF prog-id=90 op=LOAD May 17 00:42:09.519000 audit: BPF prog-id=47 op=UNLOAD May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit: BPF prog-id=91 op=LOAD May 17 00:42:09.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.520000 audit: BPF prog-id=92 op=LOAD May 17 00:42:09.520000 audit: BPF prog-id=48 op=UNLOAD May 17 00:42:09.520000 audit: BPF prog-id=49 op=UNLOAD May 17 00:42:09.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit: BPF prog-id=93 op=LOAD May 17 00:42:09.522000 audit: BPF prog-id=50 op=UNLOAD May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit: BPF prog-id=94 op=LOAD May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.522000 audit: BPF prog-id=95 op=LOAD May 17 00:42:09.522000 audit: BPF prog-id=51 op=UNLOAD May 17 00:42:09.523000 audit: BPF prog-id=52 op=UNLOAD May 17 00:42:09.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit: BPF prog-id=96 op=LOAD May 17 00:42:09.524000 audit: BPF prog-id=53 op=UNLOAD May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit: BPF prog-id=97 op=LOAD May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.524000 audit: BPF prog-id=98 op=LOAD May 17 00:42:09.524000 audit: BPF prog-id=54 op=UNLOAD May 17 00:42:09.524000 audit: BPF prog-id=55 op=UNLOAD May 17 00:42:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.525000 audit: BPF prog-id=99 op=LOAD May 17 00:42:09.525000 audit: BPF prog-id=70 op=UNLOAD May 17 00:42:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.528000 audit: BPF prog-id=100 op=LOAD May 17 00:42:09.528000 audit: BPF prog-id=56 op=UNLOAD May 17 00:42:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.529000 audit: BPF prog-id=101 op=LOAD May 17 00:42:09.529000 audit: BPF prog-id=57 op=UNLOAD May 17 00:42:09.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:09.530000 audit: BPF prog-id=102 op=LOAD May 17 00:42:09.530000 audit: BPF prog-id=66 op=UNLOAD May 17 00:42:09.550674 systemd[1]: Stopping kubelet.service... May 17 00:42:09.575995 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:42:09.576554 systemd[1]: Stopped kubelet.service. May 17 00:42:09.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:09.576936 systemd[1]: kubelet.service: Consumed 1.649s CPU time. May 17 00:42:09.581061 systemd[1]: Starting kubelet.service... May 17 00:42:10.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:10.750212 systemd[1]: Started kubelet.service. May 17 00:42:10.873518 kubelet[1936]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:10.874014 kubelet[1936]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:42:10.874267 kubelet[1936]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:10.874512 kubelet[1936]: I0517 00:42:10.874456 1936 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:42:10.908214 kubelet[1936]: I0517 00:42:10.908128 1936 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:42:10.908493 kubelet[1936]: I0517 00:42:10.908470 1936 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:42:10.910409 kubelet[1936]: I0517 00:42:10.910364 1936 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:42:10.914077 kubelet[1936]: I0517 00:42:10.914037 1936 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:42:10.945215 kubelet[1936]: I0517 00:42:10.944833 1936 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:42:10.978797 kubelet[1936]: E0517 00:42:10.978758 1936 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:42:10.978995 kubelet[1936]: I0517 00:42:10.978979 1936 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:42:10.992978 kubelet[1936]: I0517 00:42:10.992942 1936 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:42:10.994336 kubelet[1936]: I0517 00:42:10.993452 1936 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:42:10.995109 kubelet[1936]: I0517 00:42:10.994546 1936 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-c83c2ac4fc","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:42:10.995957 kubelet[1936]: I0517 00:42:10.995934 1936 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:42:10.996077 kubelet[1936]: I0517 00:42:10.996062 1936 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:42:10.996280 kubelet[1936]: I0517 00:42:10.996265 1936 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:10.996646 kubelet[1936]: I0517 00:42:10.996632 1936 kubelet.go:480] "Attempting to sync node with API server" May 17 00:42:10.996813 kubelet[1936]: I0517 00:42:10.996798 1936 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:42:10.996905 kubelet[1936]: I0517 00:42:10.996894 1936 kubelet.go:386] "Adding apiserver pod source" May 17 00:42:10.996975 kubelet[1936]: I0517 00:42:10.996964 1936 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:42:11.001868 kubelet[1936]: I0517 00:42:11.001834 1936 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:42:11.002603 kubelet[1936]: I0517 00:42:11.002577 1936 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:42:11.017044 kubelet[1936]: I0517 00:42:11.016922 1936 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:42:11.017472 kubelet[1936]: I0517 00:42:11.017448 1936 server.go:1289] "Started kubelet" May 17 00:42:11.020084 kubelet[1936]: I0517 00:42:11.020049 1936 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:42:11.020280 kubelet[1936]: I0517 00:42:11.020261 1936 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:42:11.020463 kubelet[1936]: I0517 00:42:11.020445 1936 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:42:11.019000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.019000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:11.019000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000424d50 a1=c000b44a50 a2=c000424cf0 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.019000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:11.020000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.020000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:11.020000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008791a0 a1=c000b44a68 a2=c000424e70 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:11.028323 kubelet[1936]: E0517 00:42:11.028285 1936 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:42:11.031673 kubelet[1936]: I0517 00:42:11.031608 1936 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:42:11.032922 kubelet[1936]: I0517 00:42:11.032894 1936 server.go:317] "Adding debug handlers to kubelet server" May 17 00:42:11.037097 kubelet[1936]: I0517 00:42:11.037058 1936 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:42:11.039047 kubelet[1936]: I0517 00:42:11.039010 1936 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:42:11.039474 kubelet[1936]: I0517 00:42:11.039456 1936 reconciler.go:26] "Reconciler: start to sync state" May 17 00:42:11.052488 kubelet[1936]: I0517 00:42:11.052394 1936 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:42:11.053303 kubelet[1936]: I0517 00:42:11.053272 1936 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:42:11.053851 kubelet[1936]: I0517 00:42:11.053796 1936 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:42:11.064810 kubelet[1936]: I0517 00:42:11.064749 1936 factory.go:223] Registration of the systemd container factory successfully May 17 00:42:11.065315 kubelet[1936]: I0517 00:42:11.065271 1936 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:42:11.072641 kubelet[1936]: I0517 00:42:11.072593 1936 factory.go:223] Registration of the containerd container factory successfully May 17 00:42:11.111365 kubelet[1936]: I0517 00:42:11.111290 1936 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:42:11.127403 kubelet[1936]: I0517 00:42:11.127363 1936 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:42:11.127666 kubelet[1936]: I0517 00:42:11.127648 1936 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:42:11.132230 kubelet[1936]: I0517 00:42:11.128593 1936 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:42:11.134375 kubelet[1936]: I0517 00:42:11.134349 1936 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:42:11.134899 kubelet[1936]: E0517 00:42:11.134721 1936 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:42:11.179441 kubelet[1936]: I0517 00:42:11.179409 1936 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:42:11.179713 kubelet[1936]: I0517 00:42:11.179690 1936 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:42:11.180107 kubelet[1936]: I0517 00:42:11.180086 1936 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:11.180643 kubelet[1936]: I0517 00:42:11.180617 1936 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:42:11.180821 kubelet[1936]: I0517 00:42:11.180768 1936 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:42:11.180940 kubelet[1936]: I0517 00:42:11.180925 1936 policy_none.go:49] "None policy: Start" May 17 00:42:11.181041 kubelet[1936]: I0517 00:42:11.181027 1936 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:42:11.181150 kubelet[1936]: I0517 00:42:11.181138 1936 state_mem.go:35] "Initializing new in-memory state store" May 17 00:42:11.181477 kubelet[1936]: I0517 00:42:11.181456 1936 state_mem.go:75] "Updated machine memory state" May 17 00:42:11.190132 kubelet[1936]: E0517 00:42:11.190067 1936 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:42:11.189000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.189000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:11.189000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7d4d0 a1=c000b44ea0 a2=c000a7d4a0 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:11.191801 kubelet[1936]: E0517 00:42:11.191289 1936 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:42:11.192571 kubelet[1936]: I0517 00:42:11.192547 1936 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:42:11.195869 kubelet[1936]: E0517 00:42:11.195835 1936 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:42:11.198143 kubelet[1936]: I0517 00:42:11.193318 1936 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:42:11.200406 kubelet[1936]: I0517 00:42:11.200361 1936 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:42:11.238073 kubelet[1936]: I0517 00:42:11.238002 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.238754 kubelet[1936]: I0517 00:42:11.238722 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.240069 kubelet[1936]: I0517 00:42:11.237782 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.244745 kubelet[1936]: I0517 00:42:11.244693 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.245414 kubelet[1936]: I0517 00:42:11.245321 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.245663 kubelet[1936]: I0517 00:42:11.245636 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5472c5dd6974de21655ad92c6f45181a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"5472c5dd6974de21655ad92c6f45181a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.245996 kubelet[1936]: I0517 00:42:11.245915 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.246234 kubelet[1936]: I0517 00:42:11.246207 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.246412 kubelet[1936]: I0517 00:42:11.246390 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.246593 kubelet[1936]: I0517 00:42:11.246568 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a412eab595a13ac4179ffb56e0992695-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"a412eab595a13ac4179ffb56e0992695\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.246772 kubelet[1936]: I0517 00:42:11.246751 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.246948 kubelet[1936]: I0517 00:42:11.246927 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/44f50ba19355925aefab8a27f2158896-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" (UID: \"44f50ba19355925aefab8a27f2158896\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.256528 kubelet[1936]: I0517 00:42:11.254565 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:11.257689 kubelet[1936]: I0517 00:42:11.257647 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:11.258058 kubelet[1936]: I0517 00:42:11.257917 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:11.318248 kubelet[1936]: I0517 00:42:11.318213 1936 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.352824 kubelet[1936]: I0517 00:42:11.352780 1936 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.353239 kubelet[1936]: I0517 00:42:11.353220 1936 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:11.558267 kubelet[1936]: E0517 00:42:11.558210 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:11.558699 kubelet[1936]: E0517 00:42:11.558675 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:11.559217 kubelet[1936]: E0517 00:42:11.559144 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:11.637000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.639684 kernel: kauditd_printk_skb: 269 callbacks suppressed May 17 00:42:11.639832 kernel: audit: type=1400 audit(1747442531.637:822): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.637000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b299c0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.649376 kernel: audit: type=1300 audit(1747442531.637:822): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b299c0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.653978 kernel: audit: type=1327 audit(1747442531.637:822): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.644000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.644000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b29c60 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.663392 kernel: audit: type=1400 audit(1747442531.644:823): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.663603 kernel: audit: type=1300 audit(1747442531.644:823): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b29c60 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.663656 kernel: audit: type=1327 audit(1747442531.644:823): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.644000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.671523 kernel: audit: type=1400 audit(1747442531.644:824): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.644000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b29ca0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.676860 kernel: audit: type=1300 audit(1747442531.644:824): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b29ca0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.677670 kernel: audit: type=1327 audit(1747442531.644:824): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:11.647000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.685890 kernel: audit: type=1400 audit(1747442531.647:825): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:11.647000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b29cc0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:42:11.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:12.009084 kubelet[1936]: I0517 00:42:12.008936 1936 apiserver.go:52] "Watching apiserver" May 17 00:42:12.039537 kubelet[1936]: I0517 00:42:12.039482 1936 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:42:12.161392 kubelet[1936]: I0517 00:42:12.161349 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.162684 kubelet[1936]: I0517 00:42:12.161775 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.163145 kubelet[1936]: I0517 00:42:12.162985 1936 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.175246 kubelet[1936]: I0517 00:42:12.175191 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:12.175578 kubelet[1936]: E0517 00:42:12.175536 1936 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-c83c2ac4fc\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.176000 kubelet[1936]: E0517 00:42:12.175963 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:12.178088 kubelet[1936]: I0517 00:42:12.178046 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:12.178427 kubelet[1936]: E0517 00:42:12.178359 1936 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-c83c2ac4fc\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.178615 kubelet[1936]: E0517 00:42:12.178592 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:12.178770 kubelet[1936]: I0517 00:42:12.178597 1936 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:42:12.178923 kubelet[1936]: E0517 00:42:12.178897 1936 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:12.179266 kubelet[1936]: E0517 00:42:12.179243 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:12.205643 kubelet[1936]: I0517 00:42:12.205524 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-c83c2ac4fc" podStartSLOduration=1.205474068 podStartE2EDuration="1.205474068s" podCreationTimestamp="2025-05-17 00:42:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:12.194743953 +0000 UTC m=+1.427302480" watchObservedRunningTime="2025-05-17 00:42:12.205474068 +0000 UTC m=+1.438032575" May 17 00:42:12.219205 kubelet[1936]: I0517 00:42:12.219026 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-c83c2ac4fc" podStartSLOduration=1.218968936 podStartE2EDuration="1.218968936s" podCreationTimestamp="2025-05-17 00:42:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:12.206071926 +0000 UTC m=+1.438630454" watchObservedRunningTime="2025-05-17 00:42:12.218968936 +0000 UTC m=+1.451527461" May 17 00:42:12.219855 kubelet[1936]: I0517 00:42:12.219762 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-c83c2ac4fc" podStartSLOduration=1.2197415010000001 podStartE2EDuration="1.219741501s" podCreationTimestamp="2025-05-17 00:42:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:12.218696784 +0000 UTC m=+1.451255309" watchObservedRunningTime="2025-05-17 00:42:12.219741501 +0000 UTC m=+1.452300030" May 17 00:42:13.164085 kubelet[1936]: E0517 00:42:13.164038 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:13.164596 kubelet[1936]: E0517 00:42:13.164047 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:13.165095 kubelet[1936]: E0517 00:42:13.165066 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:13.840386 kubelet[1936]: I0517 00:42:13.840347 1936 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:42:13.840982 env[1189]: time="2025-05-17T00:42:13.840891582Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:42:13.841418 kubelet[1936]: I0517 00:42:13.841297 1936 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:42:14.166622 kubelet[1936]: E0517 00:42:14.166508 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:14.167700 kubelet[1936]: E0517 00:42:14.166822 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:14.279303 systemd[1]: Created slice kubepods-besteffort-pod809237b1_a5fa_4288_87b6_d651eeb69b55.slice. May 17 00:42:14.371354 kubelet[1936]: I0517 00:42:14.371286 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/809237b1-a5fa-4288-87b6-d651eeb69b55-kube-proxy\") pod \"kube-proxy-bdmj6\" (UID: \"809237b1-a5fa-4288-87b6-d651eeb69b55\") " pod="kube-system/kube-proxy-bdmj6" May 17 00:42:14.371354 kubelet[1936]: I0517 00:42:14.371358 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/809237b1-a5fa-4288-87b6-d651eeb69b55-xtables-lock\") pod \"kube-proxy-bdmj6\" (UID: \"809237b1-a5fa-4288-87b6-d651eeb69b55\") " pod="kube-system/kube-proxy-bdmj6" May 17 00:42:14.371354 kubelet[1936]: I0517 00:42:14.371388 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hv6ph\" (UniqueName: \"kubernetes.io/projected/809237b1-a5fa-4288-87b6-d651eeb69b55-kube-api-access-hv6ph\") pod \"kube-proxy-bdmj6\" (UID: \"809237b1-a5fa-4288-87b6-d651eeb69b55\") " pod="kube-system/kube-proxy-bdmj6" May 17 00:42:14.371870 kubelet[1936]: I0517 00:42:14.371418 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/809237b1-a5fa-4288-87b6-d651eeb69b55-lib-modules\") pod \"kube-proxy-bdmj6\" (UID: \"809237b1-a5fa-4288-87b6-d651eeb69b55\") " pod="kube-system/kube-proxy-bdmj6" May 17 00:42:14.482757 kubelet[1936]: E0517 00:42:14.482061 1936 projected.go:289] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 17 00:42:14.482757 kubelet[1936]: E0517 00:42:14.482121 1936 projected.go:194] Error preparing data for projected volume kube-api-access-hv6ph for pod kube-system/kube-proxy-bdmj6: configmap "kube-root-ca.crt" not found May 17 00:42:14.482757 kubelet[1936]: E0517 00:42:14.482232 1936 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/809237b1-a5fa-4288-87b6-d651eeb69b55-kube-api-access-hv6ph podName:809237b1-a5fa-4288-87b6-d651eeb69b55 nodeName:}" failed. No retries permitted until 2025-05-17 00:42:14.982202753 +0000 UTC m=+4.214761257 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-hv6ph" (UniqueName: "kubernetes.io/projected/809237b1-a5fa-4288-87b6-d651eeb69b55-kube-api-access-hv6ph") pod "kube-proxy-bdmj6" (UID: "809237b1-a5fa-4288-87b6-d651eeb69b55") : configmap "kube-root-ca.crt" not found May 17 00:42:15.045699 systemd[1]: Created slice kubepods-besteffort-podde37cd08_5adc_4f53_8565_2a35036fd422.slice. May 17 00:42:15.078248 kubelet[1936]: I0517 00:42:15.078157 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lbz5h\" (UniqueName: \"kubernetes.io/projected/de37cd08-5adc-4f53-8565-2a35036fd422-kube-api-access-lbz5h\") pod \"tigera-operator-844669ff44-brrbc\" (UID: \"de37cd08-5adc-4f53-8565-2a35036fd422\") " pod="tigera-operator/tigera-operator-844669ff44-brrbc" May 17 00:42:15.078248 kubelet[1936]: I0517 00:42:15.078238 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/de37cd08-5adc-4f53-8565-2a35036fd422-var-lib-calico\") pod \"tigera-operator-844669ff44-brrbc\" (UID: \"de37cd08-5adc-4f53-8565-2a35036fd422\") " pod="tigera-operator/tigera-operator-844669ff44-brrbc" May 17 00:42:15.079338 kubelet[1936]: I0517 00:42:15.079246 1936 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:42:15.186581 kubelet[1936]: E0517 00:42:15.186515 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:15.189278 env[1189]: time="2025-05-17T00:42:15.187542437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdmj6,Uid:809237b1-a5fa-4288-87b6-d651eeb69b55,Namespace:kube-system,Attempt:0,}" May 17 00:42:15.220465 env[1189]: time="2025-05-17T00:42:15.220288991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:15.220465 env[1189]: time="2025-05-17T00:42:15.220457907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:15.220757 env[1189]: time="2025-05-17T00:42:15.220524771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:15.220979 env[1189]: time="2025-05-17T00:42:15.220919701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6 pid=1992 runtime=io.containerd.runc.v2 May 17 00:42:15.256219 systemd[1]: Started cri-containerd-2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6.scope. May 17 00:42:15.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.276000 audit: BPF prog-id=103 op=LOAD May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303762393863366662306631396164666439313936663061643639 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303762393863366662306631396164666439313936663061643639 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit: BPF prog-id=104 op=LOAD May 17 00:42:15.278000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000203100 items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303762393863366662306631396164666439313936663061643639 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit: BPF prog-id=105 op=LOAD May 17 00:42:15.278000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000203148 items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303762393863366662306631396164666439313936663061643639 May 17 00:42:15.278000 audit: BPF prog-id=105 op=UNLOAD May 17 00:42:15.278000 audit: BPF prog-id=104 op=UNLOAD May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.278000 audit: BPF prog-id=106 op=LOAD May 17 00:42:15.278000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000203558 items=0 ppid=1992 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303762393863366662306631396164666439313936663061643639 May 17 00:42:15.298157 env[1189]: time="2025-05-17T00:42:15.296335898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdmj6,Uid:809237b1-a5fa-4288-87b6-d651eeb69b55,Namespace:kube-system,Attempt:0,} returns sandbox id \"2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6\"" May 17 00:42:15.300265 kubelet[1936]: E0517 00:42:15.299538 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:15.305436 env[1189]: time="2025-05-17T00:42:15.305354729Z" level=info msg="CreateContainer within sandbox \"2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:42:15.316825 env[1189]: time="2025-05-17T00:42:15.316772655Z" level=info msg="CreateContainer within sandbox \"2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8b25bc8349529a6ddf88c10a06f93317d9cac1c7820c802ea260d410e352a58e\"" May 17 00:42:15.317930 env[1189]: time="2025-05-17T00:42:15.317890277Z" level=info msg="StartContainer for \"8b25bc8349529a6ddf88c10a06f93317d9cac1c7820c802ea260d410e352a58e\"" May 17 00:42:15.339013 systemd[1]: Started cri-containerd-8b25bc8349529a6ddf88c10a06f93317d9cac1c7820c802ea260d410e352a58e.scope. May 17 00:42:15.352912 env[1189]: time="2025-05-17T00:42:15.352851516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-brrbc,Uid:de37cd08-5adc-4f53-8565-2a35036fd422,Namespace:tigera-operator,Attempt:0,}" May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fdaa947ccf8 items=0 ppid=1992 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323562633833343935323961366464663838633130613036663933 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit: BPF prog-id=107 op=LOAD May 17 00:42:15.362000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a2af8 items=0 ppid=1992 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323562633833343935323961366464663838633130613036663933 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.362000 audit: BPF prog-id=108 op=LOAD May 17 00:42:15.362000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a2b48 items=0 ppid=1992 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323562633833343935323961366464663838633130613036663933 May 17 00:42:15.363000 audit: BPF prog-id=108 op=UNLOAD May 17 00:42:15.363000 audit: BPF prog-id=107 op=UNLOAD May 17 00:42:15.363000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.363000 audit: BPF prog-id=109 op=LOAD May 17 00:42:15.363000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a2bd8 items=0 ppid=1992 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323562633833343935323961366464663838633130613036663933 May 17 00:42:15.386110 env[1189]: time="2025-05-17T00:42:15.386038585Z" level=info msg="StartContainer for \"8b25bc8349529a6ddf88c10a06f93317d9cac1c7820c802ea260d410e352a58e\" returns successfully" May 17 00:42:15.392856 env[1189]: time="2025-05-17T00:42:15.392724364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:15.392856 env[1189]: time="2025-05-17T00:42:15.392813103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:15.393238 env[1189]: time="2025-05-17T00:42:15.392829834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:15.393954 env[1189]: time="2025-05-17T00:42:15.393877411Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f28a829c798b7924acf804a1cb6a10a3f17772bcc27afa1e81c79a215d6d948a pid=2062 runtime=io.containerd.runc.v2 May 17 00:42:15.414418 systemd[1]: Started cri-containerd-f28a829c798b7924acf804a1cb6a10a3f17772bcc27afa1e81c79a215d6d948a.scope. May 17 00:42:15.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.434000 audit: BPF prog-id=110 op=LOAD May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2062 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386138323963373938623739323461636638303461316362366131 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2062 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386138323963373938623739323461636638303461316362366131 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit: BPF prog-id=111 op=LOAD May 17 00:42:15.436000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002a22e0 items=0 ppid=2062 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386138323963373938623739323461636638303461316362366131 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit: BPF prog-id=112 op=LOAD May 17 00:42:15.436000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002a2328 items=0 ppid=2062 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386138323963373938623739323461636638303461316362366131 May 17 00:42:15.436000 audit: BPF prog-id=112 op=UNLOAD May 17 00:42:15.436000 audit: BPF prog-id=111 op=UNLOAD May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:15.436000 audit: BPF prog-id=113 op=LOAD May 17 00:42:15.436000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002a2738 items=0 ppid=2062 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386138323963373938623739323461636638303461316362366131 May 17 00:42:15.491225 env[1189]: time="2025-05-17T00:42:15.491149532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-brrbc,Uid:de37cd08-5adc-4f53-8565-2a35036fd422,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f28a829c798b7924acf804a1cb6a10a3f17772bcc27afa1e81c79a215d6d948a\"" May 17 00:42:15.497230 env[1189]: time="2025-05-17T00:42:15.493756266Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:42:15.718000 audit[2135]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.718000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe69e06330 a2=0 a3=7ffe69e0631c items=0 ppid=2044 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.718000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:42:15.722000 audit[2136]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.722000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffa8f5c80 a2=0 a3=7ffffa8f5c6c items=0 ppid=2044 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:42:15.725000 audit[2138]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.725000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbbbb20d0 a2=0 a3=7fffbbbb20bc items=0 ppid=2044 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:42:15.727000 audit[2140]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.727000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddc3dece0 a2=0 a3=7ffddc3deccc items=0 ppid=2044 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:42:15.738000 audit[2141]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.738000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff696e58f0 a2=0 a3=7fff696e58dc items=0 ppid=2044 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:42:15.741000 audit[2142]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.741000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc33b67be0 a2=0 a3=7ffc33b67bcc items=0 ppid=2044 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:42:15.831000 audit[2143]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.831000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0056bd00 a2=0 a3=7ffd0056bcec items=0 ppid=2044 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:42:15.836000 audit[2145]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.836000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff345b99c0 a2=0 a3=7fff345b99ac items=0 ppid=2044 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:42:15.842000 audit[2148]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.842000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe46b4eb40 a2=0 a3=7ffe46b4eb2c items=0 ppid=2044 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:42:15.844000 audit[2149]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.844000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffff0e69a0 a2=0 a3=7fffff0e698c items=0 ppid=2044 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:42:15.849000 audit[2151]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.849000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee7d82150 a2=0 a3=7ffee7d8213c items=0 ppid=2044 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:42:15.851000 audit[2152]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.851000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd31ff3fc0 a2=0 a3=7ffd31ff3fac items=0 ppid=2044 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:42:15.856000 audit[2154]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.856000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc29aab670 a2=0 a3=7ffc29aab65c items=0 ppid=2044 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:42:15.865000 audit[2157]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.865000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff519e2840 a2=0 a3=7fff519e282c items=0 ppid=2044 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:42:15.868000 audit[2158]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.868000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe542e36e0 a2=0 a3=7ffe542e36cc items=0 ppid=2044 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:42:15.873000 audit[2160]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.873000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc02b73c0 a2=0 a3=7ffcc02b73ac items=0 ppid=2044 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:42:15.875000 audit[2161]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.875000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2c6da480 a2=0 a3=7fff2c6da46c items=0 ppid=2044 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:42:15.880000 audit[2163]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.880000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedaf85700 a2=0 a3=7ffedaf856ec items=0 ppid=2044 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:15.886000 audit[2166]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.886000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe12cad3f0 a2=0 a3=7ffe12cad3dc items=0 ppid=2044 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:15.891000 audit[2169]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.891000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddf88f0e0 a2=0 a3=7ffddf88f0cc items=0 ppid=2044 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:42:15.894000 audit[2170]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.894000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5eb553f0 a2=0 a3=7ffe5eb553dc items=0 ppid=2044 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:42:15.899000 audit[2172]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.899000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffded774520 a2=0 a3=7ffded77450c items=0 ppid=2044 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:15.905000 audit[2175]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.905000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd244ad680 a2=0 a3=7ffd244ad66c items=0 ppid=2044 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:15.910000 audit[2176]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.910000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc35f2ca10 a2=0 a3=7ffc35f2c9fc items=0 ppid=2044 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:42:15.913000 audit[2178]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:15.913000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdf5a065c0 a2=0 a3=7ffdf5a065ac items=0 ppid=2044 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:42:15.950000 audit[2184]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:15.950000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc800c4a20 a2=0 a3=7ffc800c4a0c items=0 ppid=2044 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:15.961000 audit[2184]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:15.961000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc800c4a20 a2=0 a3=7ffc800c4a0c items=0 ppid=2044 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:15.964000 audit[2189]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.964000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef3c8a520 a2=0 a3=7ffef3c8a50c items=0 ppid=2044 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:42:15.969000 audit[2191]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.969000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb6815620 a2=0 a3=7ffcb681560c items=0 ppid=2044 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:42:15.976000 audit[2194]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.976000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4b8ec950 a2=0 a3=7ffe4b8ec93c items=0 ppid=2044 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:42:15.978000 audit[2195]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.978000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3e77f570 a2=0 a3=7fff3e77f55c items=0 ppid=2044 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:42:15.981000 audit[2197]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.981000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe71a3c700 a2=0 a3=7ffe71a3c6ec items=0 ppid=2044 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:42:15.983000 audit[2198]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.983000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbf059b10 a2=0 a3=7ffdbf059afc items=0 ppid=2044 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:42:15.986000 audit[2200]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.986000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffccc6de890 a2=0 a3=7ffccc6de87c items=0 ppid=2044 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:42:15.992000 audit[2203]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.992000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffcd3d7a60 a2=0 a3=7fffcd3d7a4c items=0 ppid=2044 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:42:15.994000 audit[2204]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:15.994000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5f398810 a2=0 a3=7fff5f3987fc items=0 ppid=2044 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:42:16.007000 audit[2206]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.007000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefc38dc40 a2=0 a3=7ffefc38dc2c items=0 ppid=2044 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:42:16.011000 audit[2207]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.011000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2cde9b60 a2=0 a3=7ffe2cde9b4c items=0 ppid=2044 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:42:16.015000 audit[2209]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.015000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8931d150 a2=0 a3=7ffd8931d13c items=0 ppid=2044 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:16.020000 audit[2212]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.020000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea80ac870 a2=0 a3=7ffea80ac85c items=0 ppid=2044 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:42:16.026000 audit[2215]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.026000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3b8e4ea0 a2=0 a3=7ffc3b8e4e8c items=0 ppid=2044 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:42:16.028000 audit[2216]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.028000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd89aafd00 a2=0 a3=7ffd89aafcec items=0 ppid=2044 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:42:16.032000 audit[2218]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.032000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5d410cc0 a2=0 a3=7ffd5d410cac items=0 ppid=2044 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:16.037000 audit[2221]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.037000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff9f0e05b0 a2=0 a3=7fff9f0e059c items=0 ppid=2044 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:16.039000 audit[2222]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.039000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeab2422a0 a2=0 a3=7ffeab24228c items=0 ppid=2044 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:42:16.043000 audit[2224]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.043000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff5e5b6ad0 a2=0 a3=7fff5e5b6abc items=0 ppid=2044 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:42:16.045000 audit[2225]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.045000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0b1804f0 a2=0 a3=7ffe0b1804dc items=0 ppid=2044 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:42:16.049000 audit[2227]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.049000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd8f9d9c0 a2=0 a3=7ffdd8f9d9ac items=0 ppid=2044 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:16.055000 audit[2230]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:16.055000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe75d4dc40 a2=0 a3=7ffe75d4dc2c items=0 ppid=2044 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:16.061000 audit[2232]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:42:16.061000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffc988a1c0 a2=0 a3=7fffc988a1ac items=0 ppid=2044 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.061000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:16.062000 audit[2232]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:42:16.062000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffc988a1c0 a2=0 a3=7fffc988a1ac items=0 ppid=2044 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:16.062000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:16.088166 systemd[1]: run-containerd-runc-k8s.io-2207b98c6fb0f19adfd9196f0ad69cc3410380ff3e80c0109ca5ea233df2b3a6-runc.NtsqBc.mount: Deactivated successfully. May 17 00:42:16.175632 kubelet[1936]: E0517 00:42:16.175589 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:17.244470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4239761553.mount: Deactivated successfully. May 17 00:42:19.101391 env[1189]: time="2025-05-17T00:42:19.101305247Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:19.103478 env[1189]: time="2025-05-17T00:42:19.103337057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:19.105642 env[1189]: time="2025-05-17T00:42:19.105590444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:19.108060 env[1189]: time="2025-05-17T00:42:19.107977426Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:19.115107 env[1189]: time="2025-05-17T00:42:19.114925863Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:42:19.124496 env[1189]: time="2025-05-17T00:42:19.124445646Z" level=info msg="CreateContainer within sandbox \"f28a829c798b7924acf804a1cb6a10a3f17772bcc27afa1e81c79a215d6d948a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:42:19.136205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1057772461.mount: Deactivated successfully. May 17 00:42:19.145636 env[1189]: time="2025-05-17T00:42:19.145590008Z" level=info msg="CreateContainer within sandbox \"f28a829c798b7924acf804a1cb6a10a3f17772bcc27afa1e81c79a215d6d948a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"4f28478a6f546d888a5b6e2ab3166fbce2db332fccc8b18ba849c951505746d6\"" May 17 00:42:19.146706 env[1189]: time="2025-05-17T00:42:19.146670978Z" level=info msg="StartContainer for \"4f28478a6f546d888a5b6e2ab3166fbce2db332fccc8b18ba849c951505746d6\"" May 17 00:42:19.194258 systemd[1]: Started cri-containerd-4f28478a6f546d888a5b6e2ab3166fbce2db332fccc8b18ba849c951505746d6.scope. May 17 00:42:19.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.219989 kernel: kauditd_printk_skb: 312 callbacks suppressed May 17 00:42:19.220098 kernel: audit: type=1400 audit(1747442539.217:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.225899 kernel: audit: type=1400 audit(1747442539.217:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.226057 kernel: audit: type=1400 audit(1747442539.217:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228971 kernel: audit: type=1400 audit(1747442539.217:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.239738 kernel: audit: type=1400 audit(1747442539.217:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.239935 kernel: audit: type=1400 audit(1747442539.217:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.239980 kernel: audit: type=1400 audit(1747442539.217:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.245624 kernel: audit: type=1400 audit(1747442539.217:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.245808 kernel: audit: type=1400 audit(1747442539.217:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.257725 kernel: audit: type=1400 audit(1747442539.217:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.217000 audit: BPF prog-id=114 op=LOAD May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323834373861366635343664383838613562366532616233313636 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323834373861366635343664383838613562366532616233313636 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.222000 audit: BPF prog-id=115 op=LOAD May 17 00:42:19.222000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000287180 items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323834373861366635343664383838613562366532616233313636 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.228000 audit: BPF prog-id=116 op=LOAD May 17 00:42:19.228000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002871c8 items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323834373861366635343664383838613562366532616233313636 May 17 00:42:19.231000 audit: BPF prog-id=116 op=UNLOAD May 17 00:42:19.231000 audit: BPF prog-id=115 op=UNLOAD May 17 00:42:19.231000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:19.231000 audit: BPF prog-id=117 op=LOAD May 17 00:42:19.231000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002875d8 items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323834373861366635343664383838613562366532616233313636 May 17 00:42:19.299414 env[1189]: time="2025-05-17T00:42:19.299256133Z" level=info msg="StartContainer for \"4f28478a6f546d888a5b6e2ab3166fbce2db332fccc8b18ba849c951505746d6\" returns successfully" May 17 00:42:19.490251 kubelet[1936]: E0517 00:42:19.487774 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:19.514471 kubelet[1936]: I0517 00:42:19.514386 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-bdmj6" podStartSLOduration=5.514358208 podStartE2EDuration="5.514358208s" podCreationTimestamp="2025-05-17 00:42:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:16.195608438 +0000 UTC m=+5.428166964" watchObservedRunningTime="2025-05-17 00:42:19.514358208 +0000 UTC m=+8.746916738" May 17 00:42:20.192526 kubelet[1936]: E0517 00:42:20.191887 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:21.607902 kubelet[1936]: E0517 00:42:21.607856 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:21.633574 kubelet[1936]: I0517 00:42:21.633487 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-brrbc" podStartSLOduration=4.009048023 podStartE2EDuration="7.633370235s" podCreationTimestamp="2025-05-17 00:42:14 +0000 UTC" firstStartedPulling="2025-05-17 00:42:15.493105086 +0000 UTC m=+4.725663590" lastFinishedPulling="2025-05-17 00:42:19.117427285 +0000 UTC m=+8.349985802" observedRunningTime="2025-05-17 00:42:20.218271712 +0000 UTC m=+9.450830235" watchObservedRunningTime="2025-05-17 00:42:21.633370235 +0000 UTC m=+10.865928761" May 17 00:42:22.195800 kubelet[1936]: E0517 00:42:22.195750 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:22.410608 update_engine[1179]: I0517 00:42:22.409307 1179 update_attempter.cc:509] Updating boot flags... May 17 00:42:22.769841 kubelet[1936]: E0517 00:42:22.769791 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:24.893846 sudo[1329]: pam_unix(sudo:session): session closed for user root May 17 00:42:24.892000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:24.897681 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:42:24.897876 kernel: audit: type=1106 audit(1747442544.892:937): pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:24.892000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:24.900433 kernel: audit: type=1104 audit(1747442544.892:938): pid=1329 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:24.909718 sshd[1326]: pam_unix(sshd:session): session closed for user core May 17 00:42:24.910000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:24.910000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:24.919628 kernel: audit: type=1106 audit(1747442544.910:939): pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:24.919814 kernel: audit: type=1104 audit(1747442544.910:940): pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:24.926142 systemd[1]: sshd@6-137.184.231.134:22-147.75.109.163:40752.service: Deactivated successfully. May 17 00:42:24.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.231.134:22-147.75.109.163:40752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:24.931376 kernel: audit: type=1131 audit(1747442544.925:941): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.231.134:22-147.75.109.163:40752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:24.930047 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:42:24.930287 systemd[1]: session-7.scope: Consumed 6.001s CPU time. May 17 00:42:24.930293 systemd-logind[1177]: Session 7 logged out. Waiting for processes to exit. May 17 00:42:24.932916 systemd-logind[1177]: Removed session 7. May 17 00:42:25.968000 audit[2327]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:25.968000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa88efe60 a2=0 a3=7fffa88efe4c items=0 ppid=2044 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:25.976815 kernel: audit: type=1325 audit(1747442545.968:942): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:25.977068 kernel: audit: type=1300 audit(1747442545.968:942): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa88efe60 a2=0 a3=7fffa88efe4c items=0 ppid=2044 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:25.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:25.980215 kernel: audit: type=1327 audit(1747442545.968:942): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:25.980367 kernel: audit: type=1325 audit(1747442545.978:943): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:25.978000 audit[2327]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:25.978000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa88efe60 a2=0 a3=0 items=0 ppid=2044 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:25.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:26.000195 kernel: audit: type=1300 audit(1747442545.978:943): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa88efe60 a2=0 a3=0 items=0 ppid=2044 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:26.085000 audit[2329]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:26.085000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd13c82cd0 a2=0 a3=7ffd13c82cbc items=0 ppid=2044 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:26.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:26.092000 audit[2329]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:26.092000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd13c82cd0 a2=0 a3=0 items=0 ppid=2044 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:26.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:29.334000 audit[2332]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:29.334000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff25880eb0 a2=0 a3=7fff25880e9c items=0 ppid=2044 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:29.339000 audit[2332]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:29.339000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff25880eb0 a2=0 a3=0 items=0 ppid=2044 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:29.389000 audit[2334]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:29.389000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe06fd1450 a2=0 a3=7ffe06fd143c items=0 ppid=2044 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:29.396000 audit[2334]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:29.396000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe06fd1450 a2=0 a3=0 items=0 ppid=2044 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:29.541553 systemd[1]: Created slice kubepods-besteffort-podca84bb8d_96b6_4073_bd9f_fe1bcc744bfd.slice. May 17 00:42:29.552987 kubelet[1936]: E0517 00:42:29.552887 1936 reflector.go:200] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510.3.7-n-c83c2ac4fc\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-c83c2ac4fc' and this object" logger="UnhandledError" reflector="object-\"calico-system\"/\"kube-root-ca.crt\"" type="*v1.ConfigMap" May 17 00:42:29.552987 kubelet[1936]: E0517 00:42:29.552992 1936 reflector.go:200] "Failed to watch" err="failed to list *v1.Secret: secrets \"typha-certs\" is forbidden: User \"system:node:ci-3510.3.7-n-c83c2ac4fc\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-c83c2ac4fc' and this object" logger="UnhandledError" reflector="object-\"calico-system\"/\"typha-certs\"" type="*v1.Secret" May 17 00:42:29.553907 kubelet[1936]: E0517 00:42:29.553844 1936 reflector.go:200] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"tigera-ca-bundle\" is forbidden: User \"system:node:ci-3510.3.7-n-c83c2ac4fc\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-c83c2ac4fc' and this object" logger="UnhandledError" reflector="object-\"calico-system\"/\"tigera-ca-bundle\"" type="*v1.ConfigMap" May 17 00:42:29.554724 kubelet[1936]: I0517 00:42:29.554684 1936 status_manager.go:895] "Failed to get status for pod" podUID="ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd" pod="calico-system/calico-typha-599ddf5c6c-zfr79" err="pods \"calico-typha-599ddf5c6c-zfr79\" is forbidden: User \"system:node:ci-3510.3.7-n-c83c2ac4fc\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-c83c2ac4fc' and this object" May 17 00:42:29.591544 kubelet[1936]: I0517 00:42:29.591392 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-tigera-ca-bundle\") pod \"calico-typha-599ddf5c6c-zfr79\" (UID: \"ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd\") " pod="calico-system/calico-typha-599ddf5c6c-zfr79" May 17 00:42:29.591843 kubelet[1936]: I0517 00:42:29.591806 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-typha-certs\") pod \"calico-typha-599ddf5c6c-zfr79\" (UID: \"ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd\") " pod="calico-system/calico-typha-599ddf5c6c-zfr79" May 17 00:42:29.591995 kubelet[1936]: I0517 00:42:29.591973 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2bvt\" (UniqueName: \"kubernetes.io/projected/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-kube-api-access-b2bvt\") pod \"calico-typha-599ddf5c6c-zfr79\" (UID: \"ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd\") " pod="calico-system/calico-typha-599ddf5c6c-zfr79" May 17 00:42:29.872053 systemd[1]: Created slice kubepods-besteffort-pod8bdea5f9_ccd9_4bdc_b8a2_117259bd4667.slice. May 17 00:42:29.994937 kubelet[1936]: I0517 00:42:29.994855 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qb2qb\" (UniqueName: \"kubernetes.io/projected/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-kube-api-access-qb2qb\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.995410 kubelet[1936]: I0517 00:42:29.995373 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-xtables-lock\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.995702 kubelet[1936]: I0517 00:42:29.995675 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-lib-modules\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.995939 kubelet[1936]: I0517 00:42:29.995912 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-tigera-ca-bundle\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996125 kubelet[1936]: I0517 00:42:29.996100 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-cni-bin-dir\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996307 kubelet[1936]: I0517 00:42:29.996282 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-cni-log-dir\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996442 kubelet[1936]: I0517 00:42:29.996420 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-cni-net-dir\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996644 kubelet[1936]: I0517 00:42:29.996613 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-node-certs\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996809 kubelet[1936]: I0517 00:42:29.996769 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-var-run-calico\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.996994 kubelet[1936]: I0517 00:42:29.996969 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-flexvol-driver-host\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.997143 kubelet[1936]: I0517 00:42:29.997113 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-policysync\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:29.997356 kubelet[1936]: I0517 00:42:29.997332 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8bdea5f9-ccd9-4bdc-b8a2-117259bd4667-var-lib-calico\") pod \"calico-node-vpx4l\" (UID: \"8bdea5f9-ccd9-4bdc-b8a2-117259bd4667\") " pod="calico-system/calico-node-vpx4l" May 17 00:42:30.069538 kubelet[1936]: E0517 00:42:30.069365 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:30.100530 kubelet[1936]: E0517 00:42:30.100461 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.100530 kubelet[1936]: W0517 00:42:30.100499 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.102093 kubelet[1936]: E0517 00:42:30.102006 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.102493 kubelet[1936]: E0517 00:42:30.102459 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.102493 kubelet[1936]: W0517 00:42:30.102486 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.102640 kubelet[1936]: E0517 00:42:30.102514 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.102829 kubelet[1936]: E0517 00:42:30.102806 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.102829 kubelet[1936]: W0517 00:42:30.102825 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.102961 kubelet[1936]: E0517 00:42:30.102843 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.103240 kubelet[1936]: E0517 00:42:30.103167 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.103240 kubelet[1936]: W0517 00:42:30.103207 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.103240 kubelet[1936]: E0517 00:42:30.103224 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.103893 kubelet[1936]: E0517 00:42:30.103840 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.103893 kubelet[1936]: W0517 00:42:30.103863 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.103893 kubelet[1936]: E0517 00:42:30.103883 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.104126 kubelet[1936]: E0517 00:42:30.104106 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.104126 kubelet[1936]: W0517 00:42:30.104122 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.104260 kubelet[1936]: E0517 00:42:30.104136 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.111125 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.115824 kubelet[1936]: W0517 00:42:30.111163 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.111332 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.113478 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.115824 kubelet[1936]: W0517 00:42:30.113511 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.113544 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.113861 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.115824 kubelet[1936]: W0517 00:42:30.113873 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.113888 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.115824 kubelet[1936]: E0517 00:42:30.114095 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.116432 kubelet[1936]: W0517 00:42:30.114104 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.116432 kubelet[1936]: E0517 00:42:30.114115 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.116941 kubelet[1936]: E0517 00:42:30.116526 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.116941 kubelet[1936]: W0517 00:42:30.116561 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.118917 kubelet[1936]: E0517 00:42:30.118213 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.118917 kubelet[1936]: E0517 00:42:30.118820 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.118917 kubelet[1936]: W0517 00:42:30.118843 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.118917 kubelet[1936]: E0517 00:42:30.118868 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.119226 kubelet[1936]: E0517 00:42:30.119134 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.119226 kubelet[1936]: W0517 00:42:30.119144 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.119226 kubelet[1936]: E0517 00:42:30.119155 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.159626 kubelet[1936]: E0517 00:42:30.159500 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.159626 kubelet[1936]: W0517 00:42:30.159531 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.159626 kubelet[1936]: E0517 00:42:30.159559 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.159889 kubelet[1936]: E0517 00:42:30.159802 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.159889 kubelet[1936]: W0517 00:42:30.159810 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.159889 kubelet[1936]: E0517 00:42:30.159820 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160076 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163076 kubelet[1936]: W0517 00:42:30.160097 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160116 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160458 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163076 kubelet[1936]: W0517 00:42:30.160471 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160486 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160807 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163076 kubelet[1936]: W0517 00:42:30.160820 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.160836 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163076 kubelet[1936]: E0517 00:42:30.161031 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163753 kubelet[1936]: W0517 00:42:30.161039 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161049 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161242 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163753 kubelet[1936]: W0517 00:42:30.161251 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161260 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161422 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163753 kubelet[1936]: W0517 00:42:30.161428 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161436 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.163753 kubelet[1936]: E0517 00:42:30.161615 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.163753 kubelet[1936]: W0517 00:42:30.161622 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.161630 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.161776 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.164218 kubelet[1936]: W0517 00:42:30.161781 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.161789 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.161940 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.164218 kubelet[1936]: W0517 00:42:30.161946 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.161954 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.162436 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.164218 kubelet[1936]: W0517 00:42:30.162451 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164218 kubelet[1936]: E0517 00:42:30.162478 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.164700 kubelet[1936]: E0517 00:42:30.162756 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.164700 kubelet[1936]: W0517 00:42:30.162766 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164700 kubelet[1936]: E0517 00:42:30.162776 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.164700 kubelet[1936]: E0517 00:42:30.162980 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.164700 kubelet[1936]: W0517 00:42:30.162991 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.164700 kubelet[1936]: E0517 00:42:30.163000 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.165336 kubelet[1936]: E0517 00:42:30.165280 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.165450 kubelet[1936]: W0517 00:42:30.165325 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.165450 kubelet[1936]: E0517 00:42:30.165366 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.165740 kubelet[1936]: E0517 00:42:30.165716 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.165740 kubelet[1936]: W0517 00:42:30.165735 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.165875 kubelet[1936]: E0517 00:42:30.165804 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.166158 kubelet[1936]: E0517 00:42:30.166137 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.166158 kubelet[1936]: W0517 00:42:30.166153 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.168376 kubelet[1936]: E0517 00:42:30.166166 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.168735 kubelet[1936]: E0517 00:42:30.168703 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.168735 kubelet[1936]: W0517 00:42:30.168730 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.168893 kubelet[1936]: E0517 00:42:30.168758 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.169035 kubelet[1936]: E0517 00:42:30.169003 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.169035 kubelet[1936]: W0517 00:42:30.169019 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.169035 kubelet[1936]: E0517 00:42:30.169034 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.169330 kubelet[1936]: E0517 00:42:30.169299 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.169330 kubelet[1936]: W0517 00:42:30.169310 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.169330 kubelet[1936]: E0517 00:42:30.169322 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.199680 kubelet[1936]: E0517 00:42:30.199595 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.199974 kubelet[1936]: W0517 00:42:30.199934 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.200160 kubelet[1936]: E0517 00:42:30.200134 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.200363 kubelet[1936]: I0517 00:42:30.200335 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6c4ba804-0798-4f38-8a09-cb1a05bf6cea-kubelet-dir\") pod \"csi-node-driver-t6tr9\" (UID: \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\") " pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:30.200906 kubelet[1936]: E0517 00:42:30.200860 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.200906 kubelet[1936]: W0517 00:42:30.200890 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.201089 kubelet[1936]: E0517 00:42:30.200913 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.201473 kubelet[1936]: E0517 00:42:30.201439 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.201473 kubelet[1936]: W0517 00:42:30.201455 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.201473 kubelet[1936]: E0517 00:42:30.201469 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.201963 kubelet[1936]: E0517 00:42:30.201908 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.201963 kubelet[1936]: W0517 00:42:30.201933 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.201963 kubelet[1936]: E0517 00:42:30.201947 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.202144 kubelet[1936]: I0517 00:42:30.201980 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pbnfk\" (UniqueName: \"kubernetes.io/projected/6c4ba804-0798-4f38-8a09-cb1a05bf6cea-kube-api-access-pbnfk\") pod \"csi-node-driver-t6tr9\" (UID: \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\") " pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:30.202523 kubelet[1936]: E0517 00:42:30.202495 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.202619 kubelet[1936]: W0517 00:42:30.202533 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.202619 kubelet[1936]: E0517 00:42:30.202549 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.202619 kubelet[1936]: I0517 00:42:30.202587 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6c4ba804-0798-4f38-8a09-cb1a05bf6cea-registration-dir\") pod \"csi-node-driver-t6tr9\" (UID: \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\") " pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:30.203076 kubelet[1936]: E0517 00:42:30.203001 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.203076 kubelet[1936]: W0517 00:42:30.203022 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.203076 kubelet[1936]: E0517 00:42:30.203039 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.203407 kubelet[1936]: I0517 00:42:30.203079 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6c4ba804-0798-4f38-8a09-cb1a05bf6cea-varrun\") pod \"csi-node-driver-t6tr9\" (UID: \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\") " pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:30.204360 kubelet[1936]: E0517 00:42:30.204330 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.204360 kubelet[1936]: W0517 00:42:30.204351 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.204511 kubelet[1936]: E0517 00:42:30.204368 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.204590 kubelet[1936]: I0517 00:42:30.204521 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6c4ba804-0798-4f38-8a09-cb1a05bf6cea-socket-dir\") pod \"csi-node-driver-t6tr9\" (UID: \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\") " pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:30.204880 kubelet[1936]: E0517 00:42:30.204857 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.204880 kubelet[1936]: W0517 00:42:30.204875 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.205023 kubelet[1936]: E0517 00:42:30.204891 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.205358 kubelet[1936]: E0517 00:42:30.205318 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.205358 kubelet[1936]: W0517 00:42:30.205340 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.205358 kubelet[1936]: E0517 00:42:30.205357 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.206149 kubelet[1936]: E0517 00:42:30.206126 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.206149 kubelet[1936]: W0517 00:42:30.206143 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.206149 kubelet[1936]: E0517 00:42:30.206159 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.206619 kubelet[1936]: E0517 00:42:30.206597 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.206619 kubelet[1936]: W0517 00:42:30.206612 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.206619 kubelet[1936]: E0517 00:42:30.206625 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.206844 kubelet[1936]: E0517 00:42:30.206823 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.206844 kubelet[1936]: W0517 00:42:30.206836 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.206844 kubelet[1936]: E0517 00:42:30.206845 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.207105 kubelet[1936]: E0517 00:42:30.207086 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.207105 kubelet[1936]: W0517 00:42:30.207098 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.207105 kubelet[1936]: E0517 00:42:30.207109 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.207542 kubelet[1936]: E0517 00:42:30.207514 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.207542 kubelet[1936]: W0517 00:42:30.207536 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.207690 kubelet[1936]: E0517 00:42:30.207555 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.207917 kubelet[1936]: E0517 00:42:30.207895 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.207917 kubelet[1936]: W0517 00:42:30.207911 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.208041 kubelet[1936]: E0517 00:42:30.207938 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.305383 kubelet[1936]: E0517 00:42:30.305339 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.305631 kubelet[1936]: W0517 00:42:30.305587 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.305734 kubelet[1936]: E0517 00:42:30.305711 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.306331 kubelet[1936]: E0517 00:42:30.306287 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.306549 kubelet[1936]: W0517 00:42:30.306518 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.306691 kubelet[1936]: E0517 00:42:30.306670 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.307187 kubelet[1936]: E0517 00:42:30.307141 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.307187 kubelet[1936]: W0517 00:42:30.307165 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.307450 kubelet[1936]: E0517 00:42:30.307210 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.307670 kubelet[1936]: E0517 00:42:30.307651 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.307670 kubelet[1936]: W0517 00:42:30.307666 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.307797 kubelet[1936]: E0517 00:42:30.307683 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.307918 kubelet[1936]: E0517 00:42:30.307895 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.307918 kubelet[1936]: W0517 00:42:30.307916 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.308012 kubelet[1936]: E0517 00:42:30.307926 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.308249 kubelet[1936]: E0517 00:42:30.308194 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.308249 kubelet[1936]: W0517 00:42:30.308219 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.308249 kubelet[1936]: E0517 00:42:30.308230 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.308429 kubelet[1936]: E0517 00:42:30.308408 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.308429 kubelet[1936]: W0517 00:42:30.308426 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.308551 kubelet[1936]: E0517 00:42:30.308439 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.308669 kubelet[1936]: E0517 00:42:30.308651 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.308669 kubelet[1936]: W0517 00:42:30.308670 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.308793 kubelet[1936]: E0517 00:42:30.308680 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.309006 kubelet[1936]: E0517 00:42:30.308987 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.309006 kubelet[1936]: W0517 00:42:30.309001 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.309135 kubelet[1936]: E0517 00:42:30.309015 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.309289 kubelet[1936]: E0517 00:42:30.309271 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.309289 kubelet[1936]: W0517 00:42:30.309285 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.309411 kubelet[1936]: E0517 00:42:30.309296 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.309500 kubelet[1936]: E0517 00:42:30.309484 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.309500 kubelet[1936]: W0517 00:42:30.309495 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.309599 kubelet[1936]: E0517 00:42:30.309504 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.309899 kubelet[1936]: E0517 00:42:30.309879 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.309899 kubelet[1936]: W0517 00:42:30.309894 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.310160 kubelet[1936]: E0517 00:42:30.309909 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.310584 kubelet[1936]: E0517 00:42:30.310564 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.310584 kubelet[1936]: W0517 00:42:30.310577 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.310584 kubelet[1936]: E0517 00:42:30.310588 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.310769 kubelet[1936]: E0517 00:42:30.310753 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.310829 kubelet[1936]: W0517 00:42:30.310766 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.310829 kubelet[1936]: E0517 00:42:30.310787 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.311011 kubelet[1936]: E0517 00:42:30.310991 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.311011 kubelet[1936]: W0517 00:42:30.311007 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.311113 kubelet[1936]: E0517 00:42:30.311020 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.311595 kubelet[1936]: E0517 00:42:30.311571 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.311595 kubelet[1936]: W0517 00:42:30.311591 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.311762 kubelet[1936]: E0517 00:42:30.311609 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.312075 kubelet[1936]: E0517 00:42:30.312057 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.312075 kubelet[1936]: W0517 00:42:30.312070 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.312258 kubelet[1936]: E0517 00:42:30.312081 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.312455 kubelet[1936]: E0517 00:42:30.312429 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.312455 kubelet[1936]: W0517 00:42:30.312448 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.312580 kubelet[1936]: E0517 00:42:30.312463 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.312681 kubelet[1936]: E0517 00:42:30.312666 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.312741 kubelet[1936]: W0517 00:42:30.312687 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.312741 kubelet[1936]: E0517 00:42:30.312696 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.312908 kubelet[1936]: E0517 00:42:30.312892 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.312908 kubelet[1936]: W0517 00:42:30.312903 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.313018 kubelet[1936]: E0517 00:42:30.312913 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.313391 kubelet[1936]: E0517 00:42:30.313370 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.313391 kubelet[1936]: W0517 00:42:30.313387 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.313531 kubelet[1936]: E0517 00:42:30.313417 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.313777 kubelet[1936]: E0517 00:42:30.313759 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.313777 kubelet[1936]: W0517 00:42:30.313773 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.313899 kubelet[1936]: E0517 00:42:30.313784 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.316621 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.318739 kubelet[1936]: W0517 00:42:30.316671 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.316699 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.317082 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.318739 kubelet[1936]: W0517 00:42:30.317117 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.317146 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.317539 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.318739 kubelet[1936]: W0517 00:42:30.317553 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.318739 kubelet[1936]: E0517 00:42:30.317567 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.426000 audit[2410]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:30.431133 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 00:42:30.431476 kernel: audit: type=1325 audit(1747442550.426:950): table=filter:97 family=2 entries=20 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:30.426000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc47f6e440 a2=0 a3=7ffc47f6e42c items=0 ppid=2044 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:30.436535 kernel: audit: type=1300 audit(1747442550.426:950): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc47f6e440 a2=0 a3=7ffc47f6e42c items=0 ppid=2044 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:30.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:30.445761 kernel: audit: type=1327 audit(1747442550.426:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:30.445943 kernel: audit: type=1325 audit(1747442550.439:951): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:30.439000 audit[2410]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:30.439000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc47f6e440 a2=0 a3=0 items=0 ppid=2044 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:30.450958 kernel: audit: type=1300 audit(1747442550.439:951): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc47f6e440 a2=0 a3=0 items=0 ppid=2044 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:30.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:30.454224 kernel: audit: type=1327 audit(1747442550.439:951): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:30.693631 kubelet[1936]: E0517 00:42:30.693503 1936 secret.go:189] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition May 17 00:42:30.694367 kubelet[1936]: E0517 00:42:30.694333 1936 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-typha-certs podName:ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd nodeName:}" failed. No retries permitted until 2025-05-17 00:42:31.19430155 +0000 UTC m=+20.426860068 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-typha-certs") pod "calico-typha-599ddf5c6c-zfr79" (UID: "ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd") : failed to sync secret cache: timed out waiting for the condition May 17 00:42:30.694574 kubelet[1936]: E0517 00:42:30.694522 1936 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition May 17 00:42:30.694711 kubelet[1936]: E0517 00:42:30.694693 1936 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-tigera-ca-bundle podName:ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd nodeName:}" failed. No retries permitted until 2025-05-17 00:42:31.194677401 +0000 UTC m=+20.427235905 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-tigera-ca-bundle") pod "calico-typha-599ddf5c6c-zfr79" (UID: "ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd") : failed to sync configmap cache: timed out waiting for the condition May 17 00:42:30.702775 kubelet[1936]: E0517 00:42:30.702690 1936 projected.go:289] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:42:30.703062 kubelet[1936]: E0517 00:42:30.703034 1936 projected.go:194] Error preparing data for projected volume kube-api-access-b2bvt for pod calico-system/calico-typha-599ddf5c6c-zfr79: failed to sync configmap cache: timed out waiting for the condition May 17 00:42:30.703408 kubelet[1936]: E0517 00:42:30.703377 1936 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-kube-api-access-b2bvt podName:ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd nodeName:}" failed. No retries permitted until 2025-05-17 00:42:31.203346742 +0000 UTC m=+20.435905279 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-b2bvt" (UniqueName: "kubernetes.io/projected/ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd-kube-api-access-b2bvt") pod "calico-typha-599ddf5c6c-zfr79" (UID: "ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd") : failed to sync configmap cache: timed out waiting for the condition May 17 00:42:30.713875 kubelet[1936]: E0517 00:42:30.713828 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.713875 kubelet[1936]: W0517 00:42:30.713866 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.714141 kubelet[1936]: E0517 00:42:30.713901 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.714277 kubelet[1936]: E0517 00:42:30.714252 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.714277 kubelet[1936]: W0517 00:42:30.714273 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.714380 kubelet[1936]: E0517 00:42:30.714291 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.714679 kubelet[1936]: E0517 00:42:30.714656 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.714679 kubelet[1936]: W0517 00:42:30.714675 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.714870 kubelet[1936]: E0517 00:42:30.714691 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.781629 kubelet[1936]: E0517 00:42:30.781585 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.781629 kubelet[1936]: W0517 00:42:30.781615 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.781629 kubelet[1936]: E0517 00:42:30.781641 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.815711 kubelet[1936]: E0517 00:42:30.815665 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.815711 kubelet[1936]: W0517 00:42:30.815697 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.815711 kubelet[1936]: E0517 00:42:30.815724 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.816115 kubelet[1936]: E0517 00:42:30.816023 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.816115 kubelet[1936]: W0517 00:42:30.816041 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.816115 kubelet[1936]: E0517 00:42:30.816055 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.816331 kubelet[1936]: E0517 00:42:30.816304 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.816331 kubelet[1936]: W0517 00:42:30.816321 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.816331 kubelet[1936]: E0517 00:42:30.816333 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.918147 kubelet[1936]: E0517 00:42:30.918091 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.918147 kubelet[1936]: W0517 00:42:30.918131 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.918390 kubelet[1936]: E0517 00:42:30.918163 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.918820 kubelet[1936]: E0517 00:42:30.918774 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.918820 kubelet[1936]: W0517 00:42:30.918802 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.918986 kubelet[1936]: E0517 00:42:30.918827 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.919367 kubelet[1936]: E0517 00:42:30.919210 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.919367 kubelet[1936]: W0517 00:42:30.919233 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.919367 kubelet[1936]: E0517 00:42:30.919266 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.975674 kubelet[1936]: E0517 00:42:30.975560 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.975924 kubelet[1936]: W0517 00:42:30.975885 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.976100 kubelet[1936]: E0517 00:42:30.976073 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:30.987533 kubelet[1936]: E0517 00:42:30.987464 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:30.987533 kubelet[1936]: W0517 00:42:30.987509 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:30.987533 kubelet[1936]: E0517 00:42:30.987543 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.020333 kubelet[1936]: E0517 00:42:31.020275 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.020333 kubelet[1936]: W0517 00:42:31.020314 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.020632 kubelet[1936]: E0517 00:42:31.020350 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.021437 kubelet[1936]: E0517 00:42:31.021400 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.021437 kubelet[1936]: W0517 00:42:31.021428 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.021633 kubelet[1936]: E0517 00:42:31.021453 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.023197 kubelet[1936]: E0517 00:42:31.022309 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.023197 kubelet[1936]: W0517 00:42:31.022336 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.023197 kubelet[1936]: E0517 00:42:31.022365 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.079233 env[1189]: time="2025-05-17T00:42:31.078671141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vpx4l,Uid:8bdea5f9-ccd9-4bdc-b8a2-117259bd4667,Namespace:calico-system,Attempt:0,}" May 17 00:42:31.104314 env[1189]: time="2025-05-17T00:42:31.104115143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:31.104314 env[1189]: time="2025-05-17T00:42:31.104245270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:31.104793 env[1189]: time="2025-05-17T00:42:31.104288754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:31.104793 env[1189]: time="2025-05-17T00:42:31.104700579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea pid=2435 runtime=io.containerd.runc.v2 May 17 00:42:31.123850 kubelet[1936]: E0517 00:42:31.123505 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.123850 kubelet[1936]: W0517 00:42:31.123604 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.123850 kubelet[1936]: E0517 00:42:31.123647 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.124531 kubelet[1936]: E0517 00:42:31.124312 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.124531 kubelet[1936]: W0517 00:42:31.124334 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.126693 kubelet[1936]: E0517 00:42:31.124360 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.130818 kubelet[1936]: E0517 00:42:31.130670 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.130818 kubelet[1936]: W0517 00:42:31.130702 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.130818 kubelet[1936]: E0517 00:42:31.130732 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.148573 systemd[1]: run-containerd-runc-k8s.io-00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea-runc.zxvoxu.mount: Deactivated successfully. May 17 00:42:31.174551 systemd[1]: Started cri-containerd-00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea.scope. May 17 00:42:31.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.212988 kernel: audit: type=1400 audit(1747442551.205:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.213125 kernel: audit: type=1400 audit(1747442551.205:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.218643 kernel: audit: type=1400 audit(1747442551.205:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.222784 kernel: audit: type=1400 audit(1747442551.205:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.208000 audit: BPF prog-id=118 op=LOAD May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2435 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613636363431333634646339373839306537623431316330303864 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=2435 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613636363431333634646339373839306537623431316330303864 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.214000 audit: BPF prog-id=119 op=LOAD May 17 00:42:31.214000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c00031ac90 items=0 ppid=2435 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613636363431333634646339373839306537623431316330303864 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.220000 audit: BPF prog-id=120 op=LOAD May 17 00:42:31.220000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c00031acd8 items=0 ppid=2435 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613636363431333634646339373839306537623431316330303864 May 17 00:42:31.220000 audit: BPF prog-id=120 op=UNLOAD May 17 00:42:31.221000 audit: BPF prog-id=119 op=UNLOAD May 17 00:42:31.221000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.221000 audit: BPF prog-id=121 op=LOAD May 17 00:42:31.221000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c00031b0e8 items=0 ppid=2435 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613636363431333634646339373839306537623431316330303864 May 17 00:42:31.233436 kubelet[1936]: E0517 00:42:31.233056 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.233436 kubelet[1936]: W0517 00:42:31.233092 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.233436 kubelet[1936]: E0517 00:42:31.233129 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.233871 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.239166 kubelet[1936]: W0517 00:42:31.233894 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.233921 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.234343 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.239166 kubelet[1936]: W0517 00:42:31.234370 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.234392 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.234676 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.239166 kubelet[1936]: W0517 00:42:31.234689 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.234703 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.239166 kubelet[1936]: E0517 00:42:31.234950 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.240910 kubelet[1936]: W0517 00:42:31.234964 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.234979 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.235351 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.240910 kubelet[1936]: W0517 00:42:31.235376 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.235394 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.237894 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.240910 kubelet[1936]: W0517 00:42:31.237928 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.237960 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.240910 kubelet[1936]: E0517 00:42:31.238501 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.240910 kubelet[1936]: W0517 00:42:31.238522 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.241456 kubelet[1936]: E0517 00:42:31.238557 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.241456 kubelet[1936]: E0517 00:42:31.238880 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.241456 kubelet[1936]: W0517 00:42:31.238895 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.241456 kubelet[1936]: E0517 00:42:31.238914 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.242052 kubelet[1936]: E0517 00:42:31.241776 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.242052 kubelet[1936]: W0517 00:42:31.241809 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.242052 kubelet[1936]: E0517 00:42:31.241842 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.256508 kubelet[1936]: E0517 00:42:31.256469 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.256779 kubelet[1936]: W0517 00:42:31.256747 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.257186 kubelet[1936]: E0517 00:42:31.257142 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.279900 kubelet[1936]: E0517 00:42:31.279042 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.279900 kubelet[1936]: W0517 00:42:31.279071 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.279900 kubelet[1936]: E0517 00:42:31.279103 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.283725 env[1189]: time="2025-05-17T00:42:31.283621256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vpx4l,Uid:8bdea5f9-ccd9-4bdc-b8a2-117259bd4667,Namespace:calico-system,Attempt:0,} returns sandbox id \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\"" May 17 00:42:31.284426 kubelet[1936]: E0517 00:42:31.284105 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.284426 kubelet[1936]: W0517 00:42:31.284151 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.284426 kubelet[1936]: E0517 00:42:31.284228 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.284808 kubelet[1936]: E0517 00:42:31.284788 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.285076 kubelet[1936]: W0517 00:42:31.284914 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.285076 kubelet[1936]: E0517 00:42:31.284946 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.285299 kubelet[1936]: E0517 00:42:31.285283 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.285392 kubelet[1936]: W0517 00:42:31.285375 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.285483 kubelet[1936]: E0517 00:42:31.285467 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.285937 kubelet[1936]: E0517 00:42:31.285902 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.286080 kubelet[1936]: W0517 00:42:31.286063 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.286206 kubelet[1936]: E0517 00:42:31.286183 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.293619 kubelet[1936]: E0517 00:42:31.293572 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.293868 kubelet[1936]: W0517 00:42:31.293834 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.294088 kubelet[1936]: E0517 00:42:31.294061 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.300309 env[1189]: time="2025-05-17T00:42:31.300236015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:42:31.302608 kubelet[1936]: E0517 00:42:31.302571 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:31.302921 kubelet[1936]: W0517 00:42:31.302892 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:31.303185 kubelet[1936]: E0517 00:42:31.303139 1936 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:31.346139 kubelet[1936]: E0517 00:42:31.346084 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:31.348043 env[1189]: time="2025-05-17T00:42:31.347602986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599ddf5c6c-zfr79,Uid:ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd,Namespace:calico-system,Attempt:0,}" May 17 00:42:31.369507 env[1189]: time="2025-05-17T00:42:31.369274408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:31.369507 env[1189]: time="2025-05-17T00:42:31.369420358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:31.370688 env[1189]: time="2025-05-17T00:42:31.370601046Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:31.372366 env[1189]: time="2025-05-17T00:42:31.372160697Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fbd55f35d793efc8616c126eed8d951e3024cf2776f66d35551788489d45a58 pid=2498 runtime=io.containerd.runc.v2 May 17 00:42:31.388034 systemd[1]: Started cri-containerd-3fbd55f35d793efc8616c126eed8d951e3024cf2776f66d35551788489d45a58.scope. May 17 00:42:31.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.415000 audit: BPF prog-id=122 op=LOAD May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626435356633356437393365666338363136633132366565643864 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626435356633356437393365666338363136633132366565643864 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit: BPF prog-id=123 op=LOAD May 17 00:42:31.416000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c2560 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626435356633356437393365666338363136633132366565643864 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit: BPF prog-id=124 op=LOAD May 17 00:42:31.416000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c25a8 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626435356633356437393365666338363136633132366565643864 May 17 00:42:31.416000 audit: BPF prog-id=124 op=UNLOAD May 17 00:42:31.416000 audit: BPF prog-id=123 op=UNLOAD May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:31.416000 audit: BPF prog-id=125 op=LOAD May 17 00:42:31.416000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c29b8 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626435356633356437393365666338363136633132366565643864 May 17 00:42:31.466965 env[1189]: time="2025-05-17T00:42:31.466905189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599ddf5c6c-zfr79,Uid:ca84bb8d-96b6-4073-bd9f-fe1bcc744bfd,Namespace:calico-system,Attempt:0,} returns sandbox id \"3fbd55f35d793efc8616c126eed8d951e3024cf2776f66d35551788489d45a58\"" May 17 00:42:31.469801 kubelet[1936]: E0517 00:42:31.468919 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:32.136045 kubelet[1936]: E0517 00:42:32.135925 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:32.524469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount271487159.mount: Deactivated successfully. May 17 00:42:32.708995 env[1189]: time="2025-05-17T00:42:32.708907955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:32.712575 env[1189]: time="2025-05-17T00:42:32.712492123Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:32.715708 env[1189]: time="2025-05-17T00:42:32.715582976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:32.719012 env[1189]: time="2025-05-17T00:42:32.718950012Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:32.720462 env[1189]: time="2025-05-17T00:42:32.720398184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:42:32.726624 env[1189]: time="2025-05-17T00:42:32.726521006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:42:32.730490 env[1189]: time="2025-05-17T00:42:32.730378368Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:42:32.749044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3589301003.mount: Deactivated successfully. May 17 00:42:32.755229 env[1189]: time="2025-05-17T00:42:32.755027932Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86\"" May 17 00:42:32.758604 env[1189]: time="2025-05-17T00:42:32.758536900Z" level=info msg="StartContainer for \"ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86\"" May 17 00:42:32.782048 systemd[1]: Started cri-containerd-ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86.scope. May 17 00:42:32.831000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.831000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fca16097718 items=0 ppid=2435 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:32.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162306238323962336639346536343134316133646234633766313961 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.832000 audit: BPF prog-id=126 op=LOAD May 17 00:42:32.832000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000234af8 items=0 ppid=2435 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:32.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162306238323962336639346536343134316133646234633766313961 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.833000 audit: BPF prog-id=127 op=LOAD May 17 00:42:32.833000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234b48 items=0 ppid=2435 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:32.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162306238323962336639346536343134316133646234633766313961 May 17 00:42:32.834000 audit: BPF prog-id=127 op=UNLOAD May 17 00:42:32.834000 audit: BPF prog-id=126 op=UNLOAD May 17 00:42:32.834000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:32.834000 audit: BPF prog-id=128 op=LOAD May 17 00:42:32.834000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234bd8 items=0 ppid=2435 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:32.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162306238323962336639346536343134316133646234633766313961 May 17 00:42:32.864644 env[1189]: time="2025-05-17T00:42:32.864573635Z" level=info msg="StartContainer for \"ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86\" returns successfully" May 17 00:42:32.878425 systemd[1]: cri-containerd-ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86.scope: Deactivated successfully. May 17 00:42:32.880000 audit: BPF prog-id=128 op=UNLOAD May 17 00:42:32.911615 env[1189]: time="2025-05-17T00:42:32.911544502Z" level=info msg="shim disconnected" id=ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86 May 17 00:42:32.912046 env[1189]: time="2025-05-17T00:42:32.912016870Z" level=warning msg="cleaning up after shim disconnected" id=ab0b829b3f94e64141a3db4c7f19ada8869f402351c804e2ab5c684e02918f86 namespace=k8s.io May 17 00:42:32.912163 env[1189]: time="2025-05-17T00:42:32.912145934Z" level=info msg="cleaning up dead shim" May 17 00:42:32.924785 env[1189]: time="2025-05-17T00:42:32.924699889Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2578 runtime=io.containerd.runc.v2\n" May 17 00:42:34.135386 kubelet[1936]: E0517 00:42:34.135254 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:35.304789 env[1189]: time="2025-05-17T00:42:35.304718964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:35.307883 env[1189]: time="2025-05-17T00:42:35.307835404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:35.309129 env[1189]: time="2025-05-17T00:42:35.309088148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:35.310379 env[1189]: time="2025-05-17T00:42:35.310334367Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:35.311234 env[1189]: time="2025-05-17T00:42:35.311164171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:42:35.318419 env[1189]: time="2025-05-17T00:42:35.315925909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:42:35.339845 env[1189]: time="2025-05-17T00:42:35.339781262Z" level=info msg="CreateContainer within sandbox \"3fbd55f35d793efc8616c126eed8d951e3024cf2776f66d35551788489d45a58\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:42:35.355368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2420353865.mount: Deactivated successfully. May 17 00:42:35.359847 env[1189]: time="2025-05-17T00:42:35.359780559Z" level=info msg="CreateContainer within sandbox \"3fbd55f35d793efc8616c126eed8d951e3024cf2776f66d35551788489d45a58\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6fdb090c2f7babb384cad5fae35b84c5c98e0a406653ec2000c93732dade61d2\"" May 17 00:42:35.360648 env[1189]: time="2025-05-17T00:42:35.360613638Z" level=info msg="StartContainer for \"6fdb090c2f7babb384cad5fae35b84c5c98e0a406653ec2000c93732dade61d2\"" May 17 00:42:35.387719 systemd[1]: Started cri-containerd-6fdb090c2f7babb384cad5fae35b84c5c98e0a406653ec2000c93732dade61d2.scope. May 17 00:42:35.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.412000 audit: BPF prog-id=129 op=LOAD May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:35.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666646230393063326637626162623338346361643566616533356238 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:35.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666646230393063326637626162623338346361643566616533356238 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit: BPF prog-id=130 op=LOAD May 17 00:42:35.413000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000291a00 items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:35.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666646230393063326637626162623338346361643566616533356238 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit: BPF prog-id=131 op=LOAD May 17 00:42:35.413000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000291a48 items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:35.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666646230393063326637626162623338346361643566616533356238 May 17 00:42:35.413000 audit: BPF prog-id=131 op=UNLOAD May 17 00:42:35.413000 audit: BPF prog-id=130 op=UNLOAD May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:35.413000 audit: BPF prog-id=132 op=LOAD May 17 00:42:35.413000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000291e58 items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:35.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666646230393063326637626162623338346361643566616533356238 May 17 00:42:35.473579 env[1189]: time="2025-05-17T00:42:35.473463251Z" level=info msg="StartContainer for \"6fdb090c2f7babb384cad5fae35b84c5c98e0a406653ec2000c93732dade61d2\" returns successfully" May 17 00:42:36.135977 kubelet[1936]: E0517 00:42:36.135867 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:36.237647 kubelet[1936]: E0517 00:42:36.237594 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:36.282303 kubelet[1936]: I0517 00:42:36.282221 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-599ddf5c6c-zfr79" podStartSLOduration=3.439652935 podStartE2EDuration="7.282192764s" podCreationTimestamp="2025-05-17 00:42:29 +0000 UTC" firstStartedPulling="2025-05-17 00:42:31.47078772 +0000 UTC m=+20.703346225" lastFinishedPulling="2025-05-17 00:42:35.313327525 +0000 UTC m=+24.545886054" observedRunningTime="2025-05-17 00:42:36.264690551 +0000 UTC m=+25.497249078" watchObservedRunningTime="2025-05-17 00:42:36.282192764 +0000 UTC m=+25.514751291" May 17 00:42:36.323349 kernel: kauditd_printk_skb: 211 callbacks suppressed May 17 00:42:36.323502 kernel: audit: type=1325 audit(1747442556.317:1013): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:36.317000 audit[2642]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:36.317000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdd9c349f0 a2=0 a3=7ffdd9c349dc items=0 ppid=2044 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:36.329377 kernel: audit: type=1300 audit(1747442556.317:1013): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdd9c349f0 a2=0 a3=7ffdd9c349dc items=0 ppid=2044 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:36.329514 kernel: audit: type=1327 audit(1747442556.317:1013): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:36.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:36.323000 audit[2642]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:36.332993 kernel: audit: type=1325 audit(1747442556.323:1014): table=nat:100 family=2 entries=19 op=nft_register_chain pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:36.333132 kernel: audit: type=1300 audit(1747442556.323:1014): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdd9c349f0 a2=0 a3=7ffdd9c349dc items=0 ppid=2044 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:36.323000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdd9c349f0 a2=0 a3=7ffdd9c349dc items=0 ppid=2044 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:36.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:36.338624 kernel: audit: type=1327 audit(1747442556.323:1014): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:37.239999 kubelet[1936]: E0517 00:42:37.239959 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:38.136675 kubelet[1936]: E0517 00:42:38.135049 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:38.242007 kubelet[1936]: E0517 00:42:38.241562 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:39.001326 env[1189]: time="2025-05-17T00:42:39.001260211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:39.010212 env[1189]: time="2025-05-17T00:42:39.010108073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:39.015764 env[1189]: time="2025-05-17T00:42:39.015686248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:39.016434 env[1189]: time="2025-05-17T00:42:39.016392347Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:39.018074 env[1189]: time="2025-05-17T00:42:39.018004944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:42:39.030455 env[1189]: time="2025-05-17T00:42:39.030391175Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:42:39.048751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3221004582.mount: Deactivated successfully. May 17 00:42:39.059131 env[1189]: time="2025-05-17T00:42:39.059002980Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00\"" May 17 00:42:39.063859 env[1189]: time="2025-05-17T00:42:39.063792589Z" level=info msg="StartContainer for \"01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00\"" May 17 00:42:39.109534 systemd[1]: Started cri-containerd-01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00.scope. May 17 00:42:39.120542 systemd[1]: run-containerd-runc-k8s.io-01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00-runc.KCYux6.mount: Deactivated successfully. May 17 00:42:39.157000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.157000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb3a478e4d8 items=0 ppid=2435 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.166692 kernel: audit: type=1400 audit(1747442559.157:1015): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166895 kernel: audit: type=1300 audit(1747442559.157:1015): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb3a478e4d8 items=0 ppid=2435 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.166944 kernel: audit: type=1327 audit(1747442559.157:1015): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031656263653838613362383730383365333763363137653663626439 May 17 00:42:39.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031656263653838613362383730383365333763363137653663626439 May 17 00:42:39.171738 kernel: audit: type=1400 audit(1747442559.166:1016): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.166000 audit: BPF prog-id=133 op=LOAD May 17 00:42:39.166000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002342c8 items=0 ppid=2435 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031656263653838613362383730383365333763363137653663626439 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit: BPF prog-id=134 op=LOAD May 17 00:42:39.173000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234318 items=0 ppid=2435 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031656263653838613362383730383365333763363137653663626439 May 17 00:42:39.173000 audit: BPF prog-id=134 op=UNLOAD May 17 00:42:39.173000 audit: BPF prog-id=133 op=UNLOAD May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.173000 audit: BPF prog-id=135 op=LOAD May 17 00:42:39.173000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002343a8 items=0 ppid=2435 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031656263653838613362383730383365333763363137653663626439 May 17 00:42:39.208901 env[1189]: time="2025-05-17T00:42:39.208819756Z" level=info msg="StartContainer for \"01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00\" returns successfully" May 17 00:42:40.102774 env[1189]: time="2025-05-17T00:42:40.102590972Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:42:40.106913 systemd[1]: cri-containerd-01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00.scope: Deactivated successfully. May 17 00:42:40.110000 audit: BPF prog-id=135 op=UNLOAD May 17 00:42:40.135009 kubelet[1936]: E0517 00:42:40.134941 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:40.138938 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00-rootfs.mount: Deactivated successfully. May 17 00:42:40.150137 env[1189]: time="2025-05-17T00:42:40.150055728Z" level=info msg="shim disconnected" id=01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00 May 17 00:42:40.150137 env[1189]: time="2025-05-17T00:42:40.150131324Z" level=warning msg="cleaning up after shim disconnected" id=01ebce88a3b87083e37c617e6cbd96ed428703fe9d5a3df3c7b7cd629655ce00 namespace=k8s.io May 17 00:42:40.150570 env[1189]: time="2025-05-17T00:42:40.150152834Z" level=info msg="cleaning up dead shim" May 17 00:42:40.162800 env[1189]: time="2025-05-17T00:42:40.162729676Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2694 runtime=io.containerd.runc.v2\n" May 17 00:42:40.188562 kubelet[1936]: I0517 00:42:40.185541 1936 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:42:40.236652 systemd[1]: Created slice kubepods-burstable-pod9593bbbb_d56b_40ff_9c1a_46287be24466.slice. May 17 00:42:40.248860 systemd[1]: Created slice kubepods-burstable-pod87cf0124_38f8_4ee4_a4e5_afd52aa62583.slice. May 17 00:42:40.261083 env[1189]: time="2025-05-17T00:42:40.261016151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:42:40.288438 systemd[1]: Created slice kubepods-besteffort-pod786617f2_a3ef_4787_996e_aecf8dd91826.slice. May 17 00:42:40.310170 systemd[1]: Created slice kubepods-besteffort-pod7789b832_4c09_4541_a716_5a25dc213c2f.slice. May 17 00:42:40.324036 systemd[1]: Created slice kubepods-besteffort-podf5456bdc_4fb5_4009_9808_07ee430b393f.slice. May 17 00:42:40.326897 kubelet[1936]: I0517 00:42:40.326563 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/87cf0124-38f8-4ee4-a4e5-afd52aa62583-config-volume\") pod \"coredns-674b8bbfcf-7m7m2\" (UID: \"87cf0124-38f8-4ee4-a4e5-afd52aa62583\") " pod="kube-system/coredns-674b8bbfcf-7m7m2" May 17 00:42:40.326897 kubelet[1936]: I0517 00:42:40.326613 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w5v7c\" (UniqueName: \"kubernetes.io/projected/87cf0124-38f8-4ee4-a4e5-afd52aa62583-kube-api-access-w5v7c\") pod \"coredns-674b8bbfcf-7m7m2\" (UID: \"87cf0124-38f8-4ee4-a4e5-afd52aa62583\") " pod="kube-system/coredns-674b8bbfcf-7m7m2" May 17 00:42:40.326897 kubelet[1936]: I0517 00:42:40.326650 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9593bbbb-d56b-40ff-9c1a-46287be24466-config-volume\") pod \"coredns-674b8bbfcf-ndw54\" (UID: \"9593bbbb-d56b-40ff-9c1a-46287be24466\") " pod="kube-system/coredns-674b8bbfcf-ndw54" May 17 00:42:40.326897 kubelet[1936]: I0517 00:42:40.326696 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7wsfv\" (UniqueName: \"kubernetes.io/projected/9593bbbb-d56b-40ff-9c1a-46287be24466-kube-api-access-7wsfv\") pod \"coredns-674b8bbfcf-ndw54\" (UID: \"9593bbbb-d56b-40ff-9c1a-46287be24466\") " pod="kube-system/coredns-674b8bbfcf-ndw54" May 17 00:42:40.341487 systemd[1]: Created slice kubepods-besteffort-poda89fba32_b85c_4e8b_87f7_e3febd21938a.slice. May 17 00:42:40.355132 systemd[1]: Created slice kubepods-besteffort-pod69df8fb6_fba5_46ca_8889_9f55cf9bb0d5.slice. May 17 00:42:40.428561 kubelet[1936]: I0517 00:42:40.428460 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7789b832-4c09-4541-a716-5a25dc213c2f-calico-apiserver-certs\") pod \"calico-apiserver-57f4bb9567-gds4d\" (UID: \"7789b832-4c09-4541-a716-5a25dc213c2f\") " pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" May 17 00:42:40.429004 kubelet[1936]: I0517 00:42:40.428961 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pjqk2\" (UniqueName: \"kubernetes.io/projected/786617f2-a3ef-4787-996e-aecf8dd91826-kube-api-access-pjqk2\") pod \"calico-kube-controllers-5d7c88f5f9-mnhgt\" (UID: \"786617f2-a3ef-4787-996e-aecf8dd91826\") " pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" May 17 00:42:40.429258 kubelet[1936]: I0517 00:42:40.429235 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/69df8fb6-fba5-46ca-8889-9f55cf9bb0d5-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-9rdv2\" (UID: \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\") " pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:40.430280 kubelet[1936]: I0517 00:42:40.430239 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pjvvb\" (UniqueName: \"kubernetes.io/projected/a89fba32-b85c-4e8b-87f7-e3febd21938a-kube-api-access-pjvvb\") pod \"calico-apiserver-57f4bb9567-8fw4b\" (UID: \"a89fba32-b85c-4e8b-87f7-e3febd21938a\") " pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" May 17 00:42:40.431733 kubelet[1936]: I0517 00:42:40.431661 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/786617f2-a3ef-4787-996e-aecf8dd91826-tigera-ca-bundle\") pod \"calico-kube-controllers-5d7c88f5f9-mnhgt\" (UID: \"786617f2-a3ef-4787-996e-aecf8dd91826\") " pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" May 17 00:42:40.432004 kubelet[1936]: I0517 00:42:40.431951 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5xm2\" (UniqueName: \"kubernetes.io/projected/69df8fb6-fba5-46ca-8889-9f55cf9bb0d5-kube-api-access-k5xm2\") pod \"goldmane-78d55f7ddc-9rdv2\" (UID: \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\") " pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:40.432287 kubelet[1936]: I0517 00:42:40.432262 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-backend-key-pair\") pod \"whisker-57d7dc79cf-kwmsf\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " pod="calico-system/whisker-57d7dc79cf-kwmsf" May 17 00:42:40.432535 kubelet[1936]: I0517 00:42:40.432509 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/69df8fb6-fba5-46ca-8889-9f55cf9bb0d5-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-9rdv2\" (UID: \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\") " pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:40.433325 kubelet[1936]: I0517 00:42:40.433293 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-ca-bundle\") pod \"whisker-57d7dc79cf-kwmsf\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " pod="calico-system/whisker-57d7dc79cf-kwmsf" May 17 00:42:40.433586 kubelet[1936]: I0517 00:42:40.433558 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a89fba32-b85c-4e8b-87f7-e3febd21938a-calico-apiserver-certs\") pod \"calico-apiserver-57f4bb9567-8fw4b\" (UID: \"a89fba32-b85c-4e8b-87f7-e3febd21938a\") " pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" May 17 00:42:40.433840 kubelet[1936]: I0517 00:42:40.433811 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/69df8fb6-fba5-46ca-8889-9f55cf9bb0d5-config\") pod \"goldmane-78d55f7ddc-9rdv2\" (UID: \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\") " pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:40.434017 kubelet[1936]: I0517 00:42:40.433997 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-27mmk\" (UniqueName: \"kubernetes.io/projected/f5456bdc-4fb5-4009-9808-07ee430b393f-kube-api-access-27mmk\") pod \"whisker-57d7dc79cf-kwmsf\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " pod="calico-system/whisker-57d7dc79cf-kwmsf" May 17 00:42:40.437442 kubelet[1936]: I0517 00:42:40.437331 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndndz\" (UniqueName: \"kubernetes.io/projected/7789b832-4c09-4541-a716-5a25dc213c2f-kube-api-access-ndndz\") pod \"calico-apiserver-57f4bb9567-gds4d\" (UID: \"7789b832-4c09-4541-a716-5a25dc213c2f\") " pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" May 17 00:42:40.556213 kubelet[1936]: E0517 00:42:40.552723 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:40.560521 env[1189]: time="2025-05-17T00:42:40.560445411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ndw54,Uid:9593bbbb-d56b-40ff-9c1a-46287be24466,Namespace:kube-system,Attempt:0,}" May 17 00:42:40.567626 kubelet[1936]: E0517 00:42:40.567570 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:40.583336 env[1189]: time="2025-05-17T00:42:40.579726070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-7m7m2,Uid:87cf0124-38f8-4ee4-a4e5-afd52aa62583,Namespace:kube-system,Attempt:0,}" May 17 00:42:40.654148 env[1189]: time="2025-05-17T00:42:40.653053570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-8fw4b,Uid:a89fba32-b85c-4e8b-87f7-e3febd21938a,Namespace:calico-apiserver,Attempt:0,}" May 17 00:42:40.672043 env[1189]: time="2025-05-17T00:42:40.671984944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-9rdv2,Uid:69df8fb6-fba5-46ca-8889-9f55cf9bb0d5,Namespace:calico-system,Attempt:0,}" May 17 00:42:40.901087 env[1189]: time="2025-05-17T00:42:40.900985127Z" level=error msg="Failed to destroy network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.901966 env[1189]: time="2025-05-17T00:42:40.901892848Z" level=error msg="encountered an error cleaning up failed sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.902340 env[1189]: time="2025-05-17T00:42:40.902227133Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ndw54,Uid:9593bbbb-d56b-40ff-9c1a-46287be24466,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.902910 kubelet[1936]: E0517 00:42:40.902850 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.903234 kubelet[1936]: E0517 00:42:40.903097 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ndw54" May 17 00:42:40.903234 kubelet[1936]: E0517 00:42:40.903140 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ndw54" May 17 00:42:40.903423 kubelet[1936]: E0517 00:42:40.903359 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-ndw54_kube-system(9593bbbb-d56b-40ff-9c1a-46287be24466)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-ndw54_kube-system(9593bbbb-d56b-40ff-9c1a-46287be24466)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ndw54" podUID="9593bbbb-d56b-40ff-9c1a-46287be24466" May 17 00:42:40.905610 env[1189]: time="2025-05-17T00:42:40.904722147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d7c88f5f9-mnhgt,Uid:786617f2-a3ef-4787-996e-aecf8dd91826,Namespace:calico-system,Attempt:0,}" May 17 00:42:40.918924 env[1189]: time="2025-05-17T00:42:40.918873312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-gds4d,Uid:7789b832-4c09-4541-a716-5a25dc213c2f,Namespace:calico-apiserver,Attempt:0,}" May 17 00:42:40.970914 env[1189]: time="2025-05-17T00:42:40.970842813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-57d7dc79cf-kwmsf,Uid:f5456bdc-4fb5-4009-9808-07ee430b393f,Namespace:calico-system,Attempt:0,}" May 17 00:42:40.987978 env[1189]: time="2025-05-17T00:42:40.976768569Z" level=error msg="Failed to destroy network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.989490 env[1189]: time="2025-05-17T00:42:40.989387355Z" level=error msg="encountered an error cleaning up failed sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:40.989697 env[1189]: time="2025-05-17T00:42:40.989522017Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-9rdv2,Uid:69df8fb6-fba5-46ca-8889-9f55cf9bb0d5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.000581 kubelet[1936]: E0517 00:42:40.999949 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.000581 kubelet[1936]: E0517 00:42:41.000056 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:41.000581 kubelet[1936]: E0517 00:42:41.000097 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-9rdv2" May 17 00:42:41.001054 kubelet[1936]: E0517 00:42:41.000194 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:42:41.003400 env[1189]: time="2025-05-17T00:42:41.003296637Z" level=error msg="Failed to destroy network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.007561 env[1189]: time="2025-05-17T00:42:41.007443198Z" level=error msg="encountered an error cleaning up failed sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.007931 env[1189]: time="2025-05-17T00:42:41.007849850Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-7m7m2,Uid:87cf0124-38f8-4ee4-a4e5-afd52aa62583,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.008387 kubelet[1936]: E0517 00:42:41.008342 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.008503 kubelet[1936]: E0517 00:42:41.008411 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-7m7m2" May 17 00:42:41.008503 kubelet[1936]: E0517 00:42:41.008435 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-7m7m2" May 17 00:42:41.008577 kubelet[1936]: E0517 00:42:41.008503 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-7m7m2_kube-system(87cf0124-38f8-4ee4-a4e5-afd52aa62583)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-7m7m2_kube-system(87cf0124-38f8-4ee4-a4e5-afd52aa62583)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-7m7m2" podUID="87cf0124-38f8-4ee4-a4e5-afd52aa62583" May 17 00:42:41.055703 env[1189]: time="2025-05-17T00:42:41.055601811Z" level=error msg="Failed to destroy network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.056634 env[1189]: time="2025-05-17T00:42:41.056557420Z" level=error msg="encountered an error cleaning up failed sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.056922 env[1189]: time="2025-05-17T00:42:41.056863311Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-8fw4b,Uid:a89fba32-b85c-4e8b-87f7-e3febd21938a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.057459 kubelet[1936]: E0517 00:42:41.057401 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.057586 kubelet[1936]: E0517 00:42:41.057501 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" May 17 00:42:41.057586 kubelet[1936]: E0517 00:42:41.057546 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" May 17 00:42:41.057677 kubelet[1936]: E0517 00:42:41.057627 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-57f4bb9567-8fw4b_calico-apiserver(a89fba32-b85c-4e8b-87f7-e3febd21938a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-57f4bb9567-8fw4b_calico-apiserver(a89fba32-b85c-4e8b-87f7-e3febd21938a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" podUID="a89fba32-b85c-4e8b-87f7-e3febd21938a" May 17 00:42:41.132435 env[1189]: time="2025-05-17T00:42:41.132342854Z" level=error msg="Failed to destroy network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.133235 env[1189]: time="2025-05-17T00:42:41.132931231Z" level=error msg="encountered an error cleaning up failed sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.133235 env[1189]: time="2025-05-17T00:42:41.133033383Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-gds4d,Uid:7789b832-4c09-4541-a716-5a25dc213c2f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.134093 kubelet[1936]: E0517 00:42:41.133557 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.134093 kubelet[1936]: E0517 00:42:41.133633 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" May 17 00:42:41.134093 kubelet[1936]: E0517 00:42:41.133658 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" May 17 00:42:41.134412 kubelet[1936]: E0517 00:42:41.133716 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-57f4bb9567-gds4d_calico-apiserver(7789b832-4c09-4541-a716-5a25dc213c2f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-57f4bb9567-gds4d_calico-apiserver(7789b832-4c09-4541-a716-5a25dc213c2f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" podUID="7789b832-4c09-4541-a716-5a25dc213c2f" May 17 00:42:41.236306 env[1189]: time="2025-05-17T00:42:41.229385837Z" level=error msg="Failed to destroy network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.236306 env[1189]: time="2025-05-17T00:42:41.233555213Z" level=error msg="encountered an error cleaning up failed sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.236306 env[1189]: time="2025-05-17T00:42:41.233666361Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-57d7dc79cf-kwmsf,Uid:f5456bdc-4fb5-4009-9808-07ee430b393f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.235844 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913-shm.mount: Deactivated successfully. May 17 00:42:41.245386 kubelet[1936]: E0517 00:42:41.235725 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.245386 kubelet[1936]: E0517 00:42:41.235851 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-57d7dc79cf-kwmsf" May 17 00:42:41.245386 kubelet[1936]: E0517 00:42:41.235888 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-57d7dc79cf-kwmsf" May 17 00:42:41.245736 env[1189]: time="2025-05-17T00:42:41.239861408Z" level=error msg="Failed to destroy network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.245736 env[1189]: time="2025-05-17T00:42:41.244797605Z" level=error msg="encountered an error cleaning up failed sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.245736 env[1189]: time="2025-05-17T00:42:41.245202448Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d7c88f5f9-mnhgt,Uid:786617f2-a3ef-4787-996e-aecf8dd91826,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.243163 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67-shm.mount: Deactivated successfully. May 17 00:42:41.245942 kubelet[1936]: E0517 00:42:41.235963 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-57d7dc79cf-kwmsf_calico-system(f5456bdc-4fb5-4009-9808-07ee430b393f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-57d7dc79cf-kwmsf_calico-system(f5456bdc-4fb5-4009-9808-07ee430b393f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-57d7dc79cf-kwmsf" podUID="f5456bdc-4fb5-4009-9808-07ee430b393f" May 17 00:42:41.245942 kubelet[1936]: E0517 00:42:41.245500 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.245942 kubelet[1936]: E0517 00:42:41.245581 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" May 17 00:42:41.247007 kubelet[1936]: E0517 00:42:41.245608 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" May 17 00:42:41.247007 kubelet[1936]: E0517 00:42:41.245688 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d7c88f5f9-mnhgt_calico-system(786617f2-a3ef-4787-996e-aecf8dd91826)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d7c88f5f9-mnhgt_calico-system(786617f2-a3ef-4787-996e-aecf8dd91826)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" podUID="786617f2-a3ef-4787-996e-aecf8dd91826" May 17 00:42:41.263127 kubelet[1936]: I0517 00:42:41.263060 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:41.269152 kubelet[1936]: I0517 00:42:41.269094 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:41.272792 env[1189]: time="2025-05-17T00:42:41.272729608Z" level=info msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" May 17 00:42:41.273498 env[1189]: time="2025-05-17T00:42:41.273457096Z" level=info msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" May 17 00:42:41.278761 kubelet[1936]: I0517 00:42:41.278023 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:41.282449 env[1189]: time="2025-05-17T00:42:41.282404734Z" level=info msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" May 17 00:42:41.287082 kubelet[1936]: I0517 00:42:41.287044 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:41.291058 env[1189]: time="2025-05-17T00:42:41.290991695Z" level=info msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" May 17 00:42:41.297297 kubelet[1936]: I0517 00:42:41.296719 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:41.301628 env[1189]: time="2025-05-17T00:42:41.301559243Z" level=info msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" May 17 00:42:41.304360 kubelet[1936]: I0517 00:42:41.304310 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:41.307267 env[1189]: time="2025-05-17T00:42:41.305389889Z" level=info msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" May 17 00:42:41.310330 kubelet[1936]: I0517 00:42:41.310282 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:41.312161 env[1189]: time="2025-05-17T00:42:41.311364130Z" level=info msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" May 17 00:42:41.481376 env[1189]: time="2025-05-17T00:42:41.481280879Z" level=error msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" failed" error="failed to destroy network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.481703 kubelet[1936]: E0517 00:42:41.481649 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:41.481859 kubelet[1936]: E0517 00:42:41.481741 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82"} May 17 00:42:41.481859 kubelet[1936]: E0517 00:42:41.481825 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9593bbbb-d56b-40ff-9c1a-46287be24466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.482022 kubelet[1936]: E0517 00:42:41.481869 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9593bbbb-d56b-40ff-9c1a-46287be24466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ndw54" podUID="9593bbbb-d56b-40ff-9c1a-46287be24466" May 17 00:42:41.527051 env[1189]: time="2025-05-17T00:42:41.525056043Z" level=error msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" failed" error="failed to destroy network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.527991 kubelet[1936]: E0517 00:42:41.527876 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:41.528286 kubelet[1936]: E0517 00:42:41.528024 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9"} May 17 00:42:41.528286 kubelet[1936]: E0517 00:42:41.528092 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.528456 kubelet[1936]: E0517 00:42:41.528236 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:42:41.532414 env[1189]: time="2025-05-17T00:42:41.532330851Z" level=error msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" failed" error="failed to destroy network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.533078 kubelet[1936]: E0517 00:42:41.533001 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:41.533310 kubelet[1936]: E0517 00:42:41.533091 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba"} May 17 00:42:41.533310 kubelet[1936]: E0517 00:42:41.533149 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"87cf0124-38f8-4ee4-a4e5-afd52aa62583\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.533310 kubelet[1936]: E0517 00:42:41.533204 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"87cf0124-38f8-4ee4-a4e5-afd52aa62583\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-7m7m2" podUID="87cf0124-38f8-4ee4-a4e5-afd52aa62583" May 17 00:42:41.544130 env[1189]: time="2025-05-17T00:42:41.544041096Z" level=error msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" failed" error="failed to destroy network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.544800 kubelet[1936]: E0517 00:42:41.544727 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:41.544954 kubelet[1936]: E0517 00:42:41.544824 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22"} May 17 00:42:41.544954 kubelet[1936]: E0517 00:42:41.544881 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a89fba32-b85c-4e8b-87f7-e3febd21938a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.545075 kubelet[1936]: E0517 00:42:41.544944 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a89fba32-b85c-4e8b-87f7-e3febd21938a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" podUID="a89fba32-b85c-4e8b-87f7-e3febd21938a" May 17 00:42:41.556522 env[1189]: time="2025-05-17T00:42:41.556414956Z" level=error msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" failed" error="failed to destroy network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.556880 kubelet[1936]: E0517 00:42:41.556820 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:41.556991 kubelet[1936]: E0517 00:42:41.556903 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913"} May 17 00:42:41.556991 kubelet[1936]: E0517 00:42:41.556953 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5456bdc-4fb5-4009-9808-07ee430b393f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.557100 kubelet[1936]: E0517 00:42:41.557012 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5456bdc-4fb5-4009-9808-07ee430b393f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-57d7dc79cf-kwmsf" podUID="f5456bdc-4fb5-4009-9808-07ee430b393f" May 17 00:42:41.565557 env[1189]: time="2025-05-17T00:42:41.565378611Z" level=error msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" failed" error="failed to destroy network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.566213 kubelet[1936]: E0517 00:42:41.566091 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:41.566213 kubelet[1936]: E0517 00:42:41.566168 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67"} May 17 00:42:41.566431 kubelet[1936]: E0517 00:42:41.566238 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"786617f2-a3ef-4787-996e-aecf8dd91826\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.566431 kubelet[1936]: E0517 00:42:41.566269 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"786617f2-a3ef-4787-996e-aecf8dd91826\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" podUID="786617f2-a3ef-4787-996e-aecf8dd91826" May 17 00:42:41.570490 env[1189]: time="2025-05-17T00:42:41.570365439Z" level=error msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" failed" error="failed to destroy network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:41.570817 kubelet[1936]: E0517 00:42:41.570769 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:41.570938 kubelet[1936]: E0517 00:42:41.570842 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6"} May 17 00:42:41.570938 kubelet[1936]: E0517 00:42:41.570887 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7789b832-4c09-4541-a716-5a25dc213c2f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:41.571107 kubelet[1936]: E0517 00:42:41.570937 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7789b832-4c09-4541-a716-5a25dc213c2f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" podUID="7789b832-4c09-4541-a716-5a25dc213c2f" May 17 00:42:42.146031 systemd[1]: Created slice kubepods-besteffort-pod6c4ba804_0798_4f38_8a09_cb1a05bf6cea.slice. May 17 00:42:42.153280 env[1189]: time="2025-05-17T00:42:42.153227671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6tr9,Uid:6c4ba804-0798-4f38-8a09-cb1a05bf6cea,Namespace:calico-system,Attempt:0,}" May 17 00:42:42.451992 env[1189]: time="2025-05-17T00:42:42.451388020Z" level=error msg="Failed to destroy network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:42.458070 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6-shm.mount: Deactivated successfully. May 17 00:42:42.462782 env[1189]: time="2025-05-17T00:42:42.462629898Z" level=error msg="encountered an error cleaning up failed sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:42.462967 env[1189]: time="2025-05-17T00:42:42.462834009Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6tr9,Uid:6c4ba804-0798-4f38-8a09-cb1a05bf6cea,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:42.463284 kubelet[1936]: E0517 00:42:42.463220 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:42.465209 kubelet[1936]: E0517 00:42:42.463330 1936 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:42.465209 kubelet[1936]: E0517 00:42:42.463365 1936 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t6tr9" May 17 00:42:42.465209 kubelet[1936]: E0517 00:42:42.463438 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t6tr9_calico-system(6c4ba804-0798-4f38-8a09-cb1a05bf6cea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t6tr9_calico-system(6c4ba804-0798-4f38-8a09-cb1a05bf6cea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:43.327626 kubelet[1936]: I0517 00:42:43.327563 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:43.350989 env[1189]: time="2025-05-17T00:42:43.350281265Z" level=info msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" May 17 00:42:43.414586 env[1189]: time="2025-05-17T00:42:43.414486698Z" level=error msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" failed" error="failed to destroy network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:43.415569 kubelet[1936]: E0517 00:42:43.415158 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:43.415569 kubelet[1936]: E0517 00:42:43.415390 1936 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6"} May 17 00:42:43.415569 kubelet[1936]: E0517 00:42:43.415462 1936 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:43.415569 kubelet[1936]: E0517 00:42:43.415503 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c4ba804-0798-4f38-8a09-cb1a05bf6cea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t6tr9" podUID="6c4ba804-0798-4f38-8a09-cb1a05bf6cea" May 17 00:42:48.233278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2203917729.mount: Deactivated successfully. May 17 00:42:48.276968 env[1189]: time="2025-05-17T00:42:48.276891633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:48.281238 env[1189]: time="2025-05-17T00:42:48.281144385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:48.283381 env[1189]: time="2025-05-17T00:42:48.283031664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:48.286002 env[1189]: time="2025-05-17T00:42:48.285932187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:48.286387 env[1189]: time="2025-05-17T00:42:48.286347804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:42:48.337022 env[1189]: time="2025-05-17T00:42:48.336279853Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:42:48.354584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount803082958.mount: Deactivated successfully. May 17 00:42:48.363210 env[1189]: time="2025-05-17T00:42:48.363096196Z" level=info msg="CreateContainer within sandbox \"00a66641364dc97890e7b411c008d37ac17d8d3417b5aefe0f1735327d4d9fea\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4ccaeeaa7214c1e5585f6feb367c9b993e76481ef3044e30257af059717352b1\"" May 17 00:42:48.367641 env[1189]: time="2025-05-17T00:42:48.367596954Z" level=info msg="StartContainer for \"4ccaeeaa7214c1e5585f6feb367c9b993e76481ef3044e30257af059717352b1\"" May 17 00:42:48.397590 systemd[1]: Started cri-containerd-4ccaeeaa7214c1e5585f6feb367c9b993e76481ef3044e30257af059717352b1.scope. May 17 00:42:48.441000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.444326 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:42:48.452504 kernel: audit: type=1400 audit(1747442568.441:1022): avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457869 kernel: audit: type=1300 audit(1747442568.441:1022): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9138122018 items=0 ppid=2435 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.457966 kernel: audit: type=1327 audit(1747442568.441:1022): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463636165656161373231346331653535383566366665623336376339 May 17 00:42:48.458002 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.441000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9138122018 items=0 ppid=2435 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463636165656161373231346331653535383566366665623336376339 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.465236 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.470286 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.476268 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.485236 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.495820 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.501234 kernel: audit: type=1400 audit(1747442568.443:1023): avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.443000 audit: BPF prog-id=136 op=LOAD May 17 00:42:48.443000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa778 items=0 ppid=2435 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463636165656161373231346331653535383566366665623336376339 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.457000 audit: BPF prog-id=137 op=LOAD May 17 00:42:48.457000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa7c8 items=0 ppid=2435 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463636165656161373231346331653535383566366665623336376339 May 17 00:42:48.459000 audit: BPF prog-id=137 op=UNLOAD May 17 00:42:48.459000 audit: BPF prog-id=136 op=UNLOAD May 17 00:42:48.459000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.459000 audit: BPF prog-id=138 op=LOAD May 17 00:42:48.459000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fa858 items=0 ppid=2435 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463636165656161373231346331653535383566366665623336376339 May 17 00:42:48.510616 env[1189]: time="2025-05-17T00:42:48.510559036Z" level=info msg="StartContainer for \"4ccaeeaa7214c1e5585f6feb367c9b993e76481ef3044e30257af059717352b1\" returns successfully" May 17 00:42:48.795100 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:42:48.795793 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:42:49.081286 env[1189]: time="2025-05-17T00:42:49.080320703Z" level=info msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.213 [INFO][3137] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.214 [INFO][3137] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" iface="eth0" netns="/var/run/netns/cni-8583e2ee-fdc5-2211-8433-e77381ec6ee3" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.214 [INFO][3137] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" iface="eth0" netns="/var/run/netns/cni-8583e2ee-fdc5-2211-8433-e77381ec6ee3" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.215 [INFO][3137] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" iface="eth0" netns="/var/run/netns/cni-8583e2ee-fdc5-2211-8433-e77381ec6ee3" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.215 [INFO][3137] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.215 [INFO][3137] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.427 [INFO][3144] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.429 [INFO][3144] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.430 [INFO][3144] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.445 [WARNING][3144] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.446 [INFO][3144] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.450 [INFO][3144] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:49.455827 env[1189]: 2025-05-17 00:42:49.452 [INFO][3137] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:42:49.460045 systemd[1]: run-netns-cni\x2d8583e2ee\x2dfdc5\x2d2211\x2d8433\x2de77381ec6ee3.mount: Deactivated successfully. May 17 00:42:49.462506 env[1189]: time="2025-05-17T00:42:49.462432665Z" level=info msg="TearDown network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" successfully" May 17 00:42:49.462506 env[1189]: time="2025-05-17T00:42:49.462502341Z" level=info msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" returns successfully" May 17 00:42:49.631202 kubelet[1936]: I0517 00:42:49.631113 1936 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-27mmk\" (UniqueName: \"kubernetes.io/projected/f5456bdc-4fb5-4009-9808-07ee430b393f-kube-api-access-27mmk\") pod \"f5456bdc-4fb5-4009-9808-07ee430b393f\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " May 17 00:42:49.631902 kubelet[1936]: I0517 00:42:49.631877 1936 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-backend-key-pair\") pod \"f5456bdc-4fb5-4009-9808-07ee430b393f\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " May 17 00:42:49.632005 kubelet[1936]: I0517 00:42:49.631987 1936 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-ca-bundle\") pod \"f5456bdc-4fb5-4009-9808-07ee430b393f\" (UID: \"f5456bdc-4fb5-4009-9808-07ee430b393f\") " May 17 00:42:49.641558 kubelet[1936]: I0517 00:42:49.639726 1936 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "f5456bdc-4fb5-4009-9808-07ee430b393f" (UID: "f5456bdc-4fb5-4009-9808-07ee430b393f"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:42:49.647230 systemd[1]: var-lib-kubelet-pods-f5456bdc\x2d4fb5\x2d4009\x2d9808\x2d07ee430b393f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d27mmk.mount: Deactivated successfully. May 17 00:42:49.653461 systemd[1]: var-lib-kubelet-pods-f5456bdc\x2d4fb5\x2d4009\x2d9808\x2d07ee430b393f-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:42:49.655466 kubelet[1936]: I0517 00:42:49.655396 1936 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f5456bdc-4fb5-4009-9808-07ee430b393f-kube-api-access-27mmk" (OuterVolumeSpecName: "kube-api-access-27mmk") pod "f5456bdc-4fb5-4009-9808-07ee430b393f" (UID: "f5456bdc-4fb5-4009-9808-07ee430b393f"). InnerVolumeSpecName "kube-api-access-27mmk". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:42:49.656456 kubelet[1936]: I0517 00:42:49.656416 1936 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "f5456bdc-4fb5-4009-9808-07ee430b393f" (UID: "f5456bdc-4fb5-4009-9808-07ee430b393f"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:42:49.735048 kubelet[1936]: I0517 00:42:49.734875 1936 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-c83c2ac4fc\" DevicePath \"\"" May 17 00:42:49.735048 kubelet[1936]: I0517 00:42:49.734992 1936 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5456bdc-4fb5-4009-9808-07ee430b393f-whisker-ca-bundle\") on node \"ci-3510.3.7-n-c83c2ac4fc\" DevicePath \"\"" May 17 00:42:49.735048 kubelet[1936]: I0517 00:42:49.735015 1936 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-27mmk\" (UniqueName: \"kubernetes.io/projected/f5456bdc-4fb5-4009-9808-07ee430b393f-kube-api-access-27mmk\") on node \"ci-3510.3.7-n-c83c2ac4fc\" DevicePath \"\"" May 17 00:42:50.352721 kubelet[1936]: I0517 00:42:50.352663 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:50.357344 systemd[1]: Removed slice kubepods-besteffort-podf5456bdc_4fb5_4009_9808_07ee430b393f.slice. May 17 00:42:50.390379 kubelet[1936]: I0517 00:42:50.387576 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vpx4l" podStartSLOduration=4.394929169 podStartE2EDuration="21.383917497s" podCreationTimestamp="2025-05-17 00:42:29 +0000 UTC" firstStartedPulling="2025-05-17 00:42:31.299597094 +0000 UTC m=+20.532155617" lastFinishedPulling="2025-05-17 00:42:48.28858544 +0000 UTC m=+37.521143945" observedRunningTime="2025-05-17 00:42:49.3787075 +0000 UTC m=+38.611266031" watchObservedRunningTime="2025-05-17 00:42:50.383917497 +0000 UTC m=+39.616476023" May 17 00:42:50.501187 systemd[1]: Created slice kubepods-besteffort-pod71e43f43_59e2_4a44_b5eb_200104c5a527.slice. May 17 00:42:50.589000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=24351 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.589000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd952367b4 a2=241 a3=1b6 items=1 ppid=3173 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.589000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:42:50.589000 audit: PATH item=0 name="/dev/fd/63" inode=23527 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.589000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.630000 audit[3221]: AVC avc: denied { write } for pid=3221 comm="tee" name="fd" dev="proc" ino=24369 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.633000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=23546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.633000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7e7bc7c6 a2=241 a3=1b6 items=1 ppid=3171 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.633000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:42:50.633000 audit: PATH item=0 name="/dev/fd/63" inode=23535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.633000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.637000 audit[3231]: AVC avc: denied { write } for pid=3231 comm="tee" name="fd" dev="proc" ino=24373 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.630000 audit[3221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc117f57c4 a2=241 a3=1b6 items=1 ppid=3189 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.630000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:42:50.630000 audit: PATH item=0 name="/dev/fd/63" inode=24356 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.630000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.646105 kubelet[1936]: I0517 00:42:50.646054 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qfgnq\" (UniqueName: \"kubernetes.io/projected/71e43f43-59e2-4a44-b5eb-200104c5a527-kube-api-access-qfgnq\") pod \"whisker-54cbff8cc9-7hnjg\" (UID: \"71e43f43-59e2-4a44-b5eb-200104c5a527\") " pod="calico-system/whisker-54cbff8cc9-7hnjg" May 17 00:42:50.646567 kubelet[1936]: I0517 00:42:50.646533 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/71e43f43-59e2-4a44-b5eb-200104c5a527-whisker-backend-key-pair\") pod \"whisker-54cbff8cc9-7hnjg\" (UID: \"71e43f43-59e2-4a44-b5eb-200104c5a527\") " pod="calico-system/whisker-54cbff8cc9-7hnjg" May 17 00:42:50.646756 kubelet[1936]: I0517 00:42:50.646728 1936 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/71e43f43-59e2-4a44-b5eb-200104c5a527-whisker-ca-bundle\") pod \"whisker-54cbff8cc9-7hnjg\" (UID: \"71e43f43-59e2-4a44-b5eb-200104c5a527\") " pod="calico-system/whisker-54cbff8cc9-7hnjg" May 17 00:42:50.648000 audit[3227]: AVC avc: denied { write } for pid=3227 comm="tee" name="fd" dev="proc" ino=24377 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.650000 audit[3225]: AVC avc: denied { write } for pid=3225 comm="tee" name="fd" dev="proc" ino=23550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.650000 audit[3225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe161b77b5 a2=241 a3=1b6 items=1 ppid=3179 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.650000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:42:50.650000 audit: PATH item=0 name="/dev/fd/63" inode=23538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.650000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.657000 audit[3234]: AVC avc: denied { write } for pid=3234 comm="tee" name="fd" dev="proc" ino=24380 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:50.637000 audit[3231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd553957c5 a2=241 a3=1b6 items=1 ppid=3187 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.637000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:42:50.637000 audit: PATH item=0 name="/dev/fd/63" inode=24366 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.637000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.648000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca3ad7c4 a2=241 a3=1b6 items=1 ppid=3175 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.648000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:42:50.648000 audit: PATH item=0 name="/dev/fd/63" inode=23539 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.648000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.657000 audit[3234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff99d257c4 a2=241 a3=1b6 items=1 ppid=3181 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.657000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:42:50.657000 audit: PATH item=0 name="/dev/fd/63" inode=24370 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:50.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:50.817655 env[1189]: time="2025-05-17T00:42:50.817593800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-54cbff8cc9-7hnjg,Uid:71e43f43-59e2-4a44-b5eb-200104c5a527,Namespace:calico-system,Attempt:0,}" May 17 00:42:51.111103 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:51.111406 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaafaeae0843: link becomes ready May 17 00:42:51.137341 systemd-networkd[1001]: caliaafaeae0843: Link UP May 17 00:42:51.139488 systemd-networkd[1001]: caliaafaeae0843: Gained carrier May 17 00:42:51.143983 kubelet[1936]: I0517 00:42:51.143137 1936 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="f5456bdc-4fb5-4009-9808-07ee430b393f" path="/var/lib/kubelet/pods/f5456bdc-4fb5-4009-9808-07ee430b393f/volumes" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:50.901 [INFO][3249] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:50.929 [INFO][3249] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0 whisker-54cbff8cc9- calico-system 71e43f43-59e2-4a44-b5eb-200104c5a527 970 0 2025-05-17 00:42:50 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:54cbff8cc9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc whisker-54cbff8cc9-7hnjg eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] caliaafaeae0843 [] [] }} ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:50.929 [INFO][3249] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.004 [INFO][3262] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" HandleID="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.005 [INFO][3262] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" HandleID="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b7620), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"whisker-54cbff8cc9-7hnjg", "timestamp":"2025-05-17 00:42:51.004805543 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.005 [INFO][3262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.005 [INFO][3262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.005 [INFO][3262] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.028 [INFO][3262] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.045 [INFO][3262] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.057 [INFO][3262] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.060 [INFO][3262] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.063 [INFO][3262] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.064 [INFO][3262] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.066 [INFO][3262] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.076 [INFO][3262] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.083 [INFO][3262] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.1/26] block=192.168.122.0/26 handle="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.083 [INFO][3262] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.1/26] handle="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.083 [INFO][3262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:51.158215 env[1189]: 2025-05-17 00:42:51.083 [INFO][3262] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.1/26] IPv6=[] ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" HandleID="k8s-pod-network.526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.087 [INFO][3249] cni-plugin/k8s.go 418: Populated endpoint ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0", GenerateName:"whisker-54cbff8cc9-", Namespace:"calico-system", SelfLink:"", UID:"71e43f43-59e2-4a44-b5eb-200104c5a527", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"54cbff8cc9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"whisker-54cbff8cc9-7hnjg", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.122.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"caliaafaeae0843", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.087 [INFO][3249] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.1/32] ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.087 [INFO][3249] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaafaeae0843 ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.116 [INFO][3249] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.116 [INFO][3249] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0", GenerateName:"whisker-54cbff8cc9-", Namespace:"calico-system", SelfLink:"", UID:"71e43f43-59e2-4a44-b5eb-200104c5a527", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"54cbff8cc9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e", Pod:"whisker-54cbff8cc9-7hnjg", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.122.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"caliaafaeae0843", MAC:"1e:77:c6:8a:bb:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:51.164107 env[1189]: 2025-05-17 00:42:51.145 [INFO][3249] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e" Namespace="calico-system" Pod="whisker-54cbff8cc9-7hnjg" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--54cbff8cc9--7hnjg-eth0" May 17 00:42:51.191667 env[1189]: time="2025-05-17T00:42:51.191536747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:51.192015 env[1189]: time="2025-05-17T00:42:51.191960697Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:51.192233 env[1189]: time="2025-05-17T00:42:51.192160350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:51.192753 env[1189]: time="2025-05-17T00:42:51.192552302Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e pid=3283 runtime=io.containerd.runc.v2 May 17 00:42:51.240804 systemd[1]: Started cri-containerd-526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e.scope. May 17 00:42:51.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.283000 audit: BPF prog-id=139 op=LOAD May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3283 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532366130373731653334623063323231383834623263383432643736 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3283 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532366130373731653334623063323231383834623263383432643736 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit: BPF prog-id=140 op=LOAD May 17 00:42:51.284000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00025dce0 items=0 ppid=3283 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532366130373731653334623063323231383834623263383432643736 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit: BPF prog-id=141 op=LOAD May 17 00:42:51.284000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00025dd28 items=0 ppid=3283 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532366130373731653334623063323231383834623263383432643736 May 17 00:42:51.284000 audit: BPF prog-id=141 op=UNLOAD May 17 00:42:51.284000 audit: BPF prog-id=140 op=UNLOAD May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.284000 audit: BPF prog-id=142 op=LOAD May 17 00:42:51.284000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000360138 items=0 ppid=3283 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532366130373731653334623063323231383834623263383432643736 May 17 00:42:51.336202 env[1189]: time="2025-05-17T00:42:51.336099599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-54cbff8cc9-7hnjg,Uid:71e43f43-59e2-4a44-b5eb-200104c5a527,Namespace:calico-system,Attempt:0,} returns sandbox id \"526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e\"" May 17 00:42:51.344933 env[1189]: time="2025-05-17T00:42:51.344880587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:42:51.397000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.397000 audit: BPF prog-id=143 op=LOAD May 17 00:42:51.397000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe61559650 a2=98 a3=3 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.397000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.397000 audit: BPF prog-id=143 op=UNLOAD May 17 00:42:51.401000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.401000 audit: BPF prog-id=144 op=LOAD May 17 00:42:51.401000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61559440 a2=94 a3=54428f items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.401000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.402000 audit: BPF prog-id=144 op=UNLOAD May 17 00:42:51.402000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.402000 audit: BPF prog-id=145 op=LOAD May 17 00:42:51.402000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61559470 a2=94 a3=2 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.402000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.402000 audit: BPF prog-id=145 op=UNLOAD May 17 00:42:51.561000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit: BPF prog-id=146 op=LOAD May 17 00:42:51.561000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61559330 a2=94 a3=1 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.561000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.561000 audit: BPF prog-id=146 op=UNLOAD May 17 00:42:51.561000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.561000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe61559400 a2=50 a3=7ffe615594e0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.561000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61559340 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61559370 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61559280 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61559390 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61559370 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61559360 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61559390 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61559370 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61559390 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61559360 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe615593d0 a2=28 a3=0 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe61559180 a2=50 a3=1 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.575000 audit: BPF prog-id=147 op=LOAD May 17 00:42:51.575000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe61559180 a2=94 a3=5 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.575000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.575000 audit: BPF prog-id=147 op=UNLOAD May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe61559230 a2=50 a3=1 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.576000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe61559350 a2=4 a3=38 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.576000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { confidentiality } for pid=3344 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:51.576000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe615593a0 a2=94 a3=6 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.576000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { confidentiality } for pid=3344 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:51.576000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe61558b50 a2=94 a3=88 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.576000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.576000 audit[3344]: AVC avc: denied { confidentiality } for pid=3344 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:51.576000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe61558b50 a2=94 a3=88 items=0 ppid=3182 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.576000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:51.594417 env[1189]: time="2025-05-17T00:42:51.594320635Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:51.596398 env[1189]: time="2025-05-17T00:42:51.595922265Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:51.594000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.594000 audit: BPF prog-id=148 op=LOAD May 17 00:42:51.594000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe53e89730 a2=98 a3=1999999999999999 items=0 ppid=3182 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.594000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:51.595000 audit: BPF prog-id=148 op=UNLOAD May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit: BPF prog-id=149 op=LOAD May 17 00:42:51.595000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe53e89610 a2=94 a3=ffff items=0 ppid=3182 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:51.595000 audit: BPF prog-id=149 op=UNLOAD May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.595000 audit: BPF prog-id=150 op=LOAD May 17 00:42:51.595000 audit[3349]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe53e89650 a2=94 a3=7ffe53e89830 items=0 ppid=3182 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:51.596000 audit: BPF prog-id=150 op=UNLOAD May 17 00:42:51.608850 kubelet[1936]: E0517 00:42:51.596398 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:51.608850 kubelet[1936]: E0517 00:42:51.596540 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:51.609201 env[1189]: time="2025-05-17T00:42:51.608233798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:42:51.609396 kubelet[1936]: E0517 00:42:51.602624 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9f96105e76194fff987cd18206f07c37,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:51.730377 systemd-networkd[1001]: vxlan.calico: Link UP May 17 00:42:51.730391 systemd-networkd[1001]: vxlan.calico: Gained carrier May 17 00:42:51.760115 systemd[1]: run-containerd-runc-k8s.io-526a0771e34b0c221884b2c842d76f9cb9dc4dc0e7fb5d6d83aa4c9426f6b92e-runc.IVdgkd.mount: Deactivated successfully. May 17 00:42:51.789000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.789000 audit: BPF prog-id=151 op=LOAD May 17 00:42:51.789000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd97abcb0 a2=98 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.790000 audit: BPF prog-id=151 op=UNLOAD May 17 00:42:51.790000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.790000 audit: BPF prog-id=152 op=LOAD May 17 00:42:51.790000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd97abac0 a2=94 a3=54428f items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit: BPF prog-id=152 op=UNLOAD May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit: BPF prog-id=153 op=LOAD May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd97abaf0 a2=94 a3=2 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit: BPF prog-id=153 op=UNLOAD May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97ab9c0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd97ab9f0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd97ab900 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97aba10 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97ab9f0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97ab9e0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97aba10 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd97ab9f0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd97aba10 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd97ab9e0 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd97aba50 a2=28 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.791000 audit: BPF prog-id=154 op=LOAD May 17 00:42:51.791000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd97ab8c0 a2=94 a3=0 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.791000 audit: BPF prog-id=154 op=UNLOAD May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffd97ab8b0 a2=50 a3=2800 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffd97ab8b0 a2=50 a3=2800 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit: BPF prog-id=155 op=LOAD May 17 00:42:51.792000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd97ab0d0 a2=94 a3=2 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.792000 audit: BPF prog-id=155 op=UNLOAD May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.792000 audit: BPF prog-id=156 op=LOAD May 17 00:42:51.792000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd97ab1d0 a2=94 a3=30 items=0 ppid=3182 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.811000 audit: BPF prog-id=157 op=LOAD May 17 00:42:51.811000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc24061620 a2=98 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.811000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:51.825000 audit: BPF prog-id=157 op=UNLOAD May 17 00:42:51.825000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825000 audit: BPF prog-id=158 op=LOAD May 17 00:42:51.825000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc24061410 a2=94 a3=54428f items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:51.826000 audit: BPF prog-id=158 op=UNLOAD May 17 00:42:51.826000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.826000 audit: BPF prog-id=159 op=LOAD May 17 00:42:51.826000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc24061440 a2=94 a3=2 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:51.826000 audit: BPF prog-id=159 op=UNLOAD May 17 00:42:51.861925 env[1189]: time="2025-05-17T00:42:51.861608424Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:51.863684 env[1189]: time="2025-05-17T00:42:51.863468944Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:51.866920 kubelet[1936]: E0517 00:42:51.864328 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:51.866920 kubelet[1936]: E0517 00:42:51.864409 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:51.867590 kubelet[1936]: E0517 00:42:51.864936 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:51.869943 kubelet[1936]: E0517 00:42:51.869780 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:42:52.041000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.041000 audit: BPF prog-id=160 op=LOAD May 17 00:42:52.041000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc24061300 a2=94 a3=1 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.041000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.042000 audit: BPF prog-id=160 op=UNLOAD May 17 00:42:52.042000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.042000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc240613d0 a2=50 a3=7ffc240614b0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.042000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.058000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.058000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc24061310 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.059000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.059000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc24061340 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.059000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.059000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.059000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc24061250 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.059000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.060000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.060000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc24061360 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.060000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.060000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc24061340 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.060000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.060000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc24061330 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.060000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.060000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc24061360 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.060000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.060000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc24061340 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.061000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.061000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc24061360 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.061000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.061000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc24061330 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.061000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.061000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc240613a0 a2=28 a3=0 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc24061150 a2=50 a3=1 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.062000 audit: BPF prog-id=161 op=LOAD May 17 00:42:52.062000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc24061150 a2=94 a3=5 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.063000 audit: BPF prog-id=161 op=UNLOAD May 17 00:42:52.063000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.063000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc24061200 a2=50 a3=1 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.063000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc24061320 a2=4 a3=38 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.064000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.064000 audit[3377]: AVC avc: denied { confidentiality } for pid=3377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:52.064000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc24061370 a2=94 a3=6 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.064000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.065000 audit[3377]: AVC avc: denied { confidentiality } for pid=3377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:52.065000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc24060b20 a2=94 a3=88 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.065000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.066000 audit[3377]: AVC avc: denied { confidentiality } for pid=3377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:52.066000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc24060b20 a2=94 a3=88 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.066000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.068000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.068000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc24062550 a2=10 a3=f8f00800 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.068000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.068000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.068000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc240623f0 a2=10 a3=3 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.068000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.069000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.069000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc24062390 a2=10 a3=3 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.069000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.069000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:52.069000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc24062390 a2=10 a3=7 items=0 ppid=3182 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.069000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:52.082000 audit: BPF prog-id=156 op=UNLOAD May 17 00:42:52.138130 env[1189]: time="2025-05-17T00:42:52.137321651Z" level=info msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" May 17 00:42:52.138130 env[1189]: time="2025-05-17T00:42:52.137330878Z" level=info msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" May 17 00:42:52.288000 audit[3433]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3433 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:52.288000 audit[3433]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd2627fde0 a2=0 a3=7ffd2627fdcc items=0 ppid=3182 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:52.351000 audit[3436]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:52.351000 audit[3436]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff686b75d0 a2=0 a3=7fff686b75bc items=0 ppid=3182 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:52.361000 audit[3434]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:52.361000 audit[3434]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffecbda91e0 a2=0 a3=7ffecbda91cc items=0 ppid=3182 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.361000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:52.371242 kubelet[1936]: E0517 00:42:52.368267 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:42:52.364000 audit[3440]: NETFILTER_CFG table=filter:104 family=2 entries=94 op=nft_register_chain pid=3440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:52.364000 audit[3440]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7fff0b6915e0 a2=0 a3=7fff0b6915cc items=0 ppid=3182 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.364000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.277 [INFO][3416] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.277 [INFO][3416] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" iface="eth0" netns="/var/run/netns/cni-a11aa883-d343-0799-eecf-80a7ae1112e2" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.278 [INFO][3416] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" iface="eth0" netns="/var/run/netns/cni-a11aa883-d343-0799-eecf-80a7ae1112e2" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.278 [INFO][3416] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" iface="eth0" netns="/var/run/netns/cni-a11aa883-d343-0799-eecf-80a7ae1112e2" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.278 [INFO][3416] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.278 [INFO][3416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.400 [INFO][3438] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.405 [INFO][3438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.405 [INFO][3438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.424 [WARNING][3438] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.424 [INFO][3438] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.428 [INFO][3438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:52.443082 env[1189]: 2025-05-17 00:42:52.430 [INFO][3416] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:42:52.448407 env[1189]: time="2025-05-17T00:42:52.448334378Z" level=info msg="TearDown network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" successfully" May 17 00:42:52.448541 systemd[1]: run-netns-cni\x2da11aa883\x2dd343\x2d0799\x2deecf\x2d80a7ae1112e2.mount: Deactivated successfully. May 17 00:42:52.449240 env[1189]: time="2025-05-17T00:42:52.449152433Z" level=info msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" returns successfully" May 17 00:42:52.454433 env[1189]: time="2025-05-17T00:42:52.450818772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-9rdv2,Uid:69df8fb6-fba5-46ca-8889-9f55cf9bb0d5,Namespace:calico-system,Attempt:1,}" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.354 [INFO][3414] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.355 [INFO][3414] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" iface="eth0" netns="/var/run/netns/cni-a07425cc-ac7c-96cf-1d5b-16c675a0ffef" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.355 [INFO][3414] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" iface="eth0" netns="/var/run/netns/cni-a07425cc-ac7c-96cf-1d5b-16c675a0ffef" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.355 [INFO][3414] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" iface="eth0" netns="/var/run/netns/cni-a07425cc-ac7c-96cf-1d5b-16c675a0ffef" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.355 [INFO][3414] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.356 [INFO][3414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.498 [INFO][3455] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.499 [INFO][3455] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.499 [INFO][3455] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.510 [WARNING][3455] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.510 [INFO][3455] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.514 [INFO][3455] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:52.520460 env[1189]: 2025-05-17 00:42:52.517 [INFO][3414] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:42:52.526238 env[1189]: time="2025-05-17T00:42:52.526091854Z" level=info msg="TearDown network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" successfully" May 17 00:42:52.526500 env[1189]: time="2025-05-17T00:42:52.526439029Z" level=info msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" returns successfully" May 17 00:42:52.527592 systemd[1]: run-netns-cni\x2da07425cc\x2dac7c\x2d96cf\x2d1d5b\x2d16c675a0ffef.mount: Deactivated successfully. May 17 00:42:52.529972 env[1189]: time="2025-05-17T00:42:52.529894107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d7c88f5f9-mnhgt,Uid:786617f2-a3ef-4787-996e-aecf8dd91826,Namespace:calico-system,Attempt:1,}" May 17 00:42:52.541000 audit[3476]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:52.541000 audit[3476]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc31680bb0 a2=0 a3=7ffc31680b9c items=0 ppid=2044 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:52.548000 audit[3476]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:52.548000 audit[3476]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc31680bb0 a2=0 a3=0 items=0 ppid=2044 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:52.835703 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali467445eb7fe: link becomes ready May 17 00:42:52.836888 systemd-networkd[1001]: cali467445eb7fe: Link UP May 17 00:42:52.837365 systemd-networkd[1001]: cali467445eb7fe: Gained carrier May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.603 [INFO][3467] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0 goldmane-78d55f7ddc- calico-system 69df8fb6-fba5-46ca-8889-9f55cf9bb0d5 985 0 2025-05-17 00:42:29 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc goldmane-78d55f7ddc-9rdv2 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali467445eb7fe [] [] }} ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.603 [INFO][3467] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.693 [INFO][3491] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" HandleID="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.693 [INFO][3491] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" HandleID="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b74d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"goldmane-78d55f7ddc-9rdv2", "timestamp":"2025-05-17 00:42:52.693261605 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.693 [INFO][3491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.693 [INFO][3491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.693 [INFO][3491] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.716 [INFO][3491] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.746 [INFO][3491] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.766 [INFO][3491] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.772 [INFO][3491] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.778 [INFO][3491] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.778 [INFO][3491] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.782 [INFO][3491] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.795 [INFO][3491] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.805 [INFO][3491] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.2/26] block=192.168.122.0/26 handle="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.805 [INFO][3491] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.2/26] handle="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.806 [INFO][3491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:52.863086 env[1189]: 2025-05-17 00:42:52.806 [INFO][3491] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.2/26] IPv6=[] ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" HandleID="k8s-pod-network.3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.810 [INFO][3467] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"goldmane-78d55f7ddc-9rdv2", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.122.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali467445eb7fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.810 [INFO][3467] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.2/32] ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.810 [INFO][3467] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali467445eb7fe ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.835 [INFO][3467] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.838 [INFO][3467] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba", Pod:"goldmane-78d55f7ddc-9rdv2", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.122.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali467445eb7fe", MAC:"aa:e6:38:59:b2:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:52.865418 env[1189]: 2025-05-17 00:42:52.857 [INFO][3467] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba" Namespace="calico-system" Pod="goldmane-78d55f7ddc-9rdv2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:42:52.890128 env[1189]: time="2025-05-17T00:42:52.890017000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:52.890652 env[1189]: time="2025-05-17T00:42:52.890580289Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:52.890870 env[1189]: time="2025-05-17T00:42:52.890834177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:52.891601 env[1189]: time="2025-05-17T00:42:52.891530979Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba pid=3520 runtime=io.containerd.runc.v2 May 17 00:42:52.937946 systemd[1]: Started cri-containerd-3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba.scope. May 17 00:42:52.944789 systemd[1]: run-containerd-runc-k8s.io-3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba-runc.9zU8uI.mount: Deactivated successfully. May 17 00:42:52.935000 audit[3533]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=3533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:52.935000 audit[3533]: SYSCALL arch=c000003e syscall=46 success=yes exit=25180 a0=3 a1=7ffcef006530 a2=0 a3=7ffcef00651c items=0 ppid=3182 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:52.935000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:52.983622 systemd-networkd[1001]: caliaf5ebb4be99: Link UP May 17 00:42:52.986113 systemd-networkd[1001]: caliaf5ebb4be99: Gained carrier May 17 00:42:52.986552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaf5ebb4be99: link becomes ready May 17 00:42:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.002000 audit: BPF prog-id=162 op=LOAD May 17 00:42:53.003000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.003000 audit[3532]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3520 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626139386237303837363962623265663631346264623433333834 May 17 00:42:53.003000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.003000 audit[3532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3520 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626139386237303837363962623265663631346264623433333834 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.004000 audit: BPF prog-id=163 op=LOAD May 17 00:42:53.004000 audit[3532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00025df90 items=0 ppid=3520 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626139386237303837363962623265663631346264623433333834 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.005000 audit: BPF prog-id=164 op=LOAD May 17 00:42:53.005000 audit[3532]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00025dfd8 items=0 ppid=3520 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626139386237303837363962623265663631346264623433333834 May 17 00:42:53.006000 audit: BPF prog-id=164 op=UNLOAD May 17 00:42:53.006000 audit: BPF prog-id=163 op=UNLOAD May 17 00:42:53.006000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.006000 audit: BPF prog-id=165 op=LOAD May 17 00:42:53.006000 audit[3532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035c3e8 items=0 ppid=3520 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626139386237303837363962623265663631346264623433333834 May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.653 [INFO][3478] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0 calico-kube-controllers-5d7c88f5f9- calico-system 786617f2-a3ef-4787-996e-aecf8dd91826 986 0 2025-05-17 00:42:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d7c88f5f9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc calico-kube-controllers-5d7c88f5f9-mnhgt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaf5ebb4be99 [] [] }} ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.653 [INFO][3478] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.718 [INFO][3499] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" HandleID="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.719 [INFO][3499] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" HandleID="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d96d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"calico-kube-controllers-5d7c88f5f9-mnhgt", "timestamp":"2025-05-17 00:42:52.718522935 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.720 [INFO][3499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.805 [INFO][3499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.806 [INFO][3499] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.846 [INFO][3499] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.862 [INFO][3499] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.903 [INFO][3499] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.913 [INFO][3499] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.920 [INFO][3499] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.920 [INFO][3499] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.933 [INFO][3499] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226 May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.959 [INFO][3499] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.973 [INFO][3499] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.3/26] block=192.168.122.0/26 handle="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.973 [INFO][3499] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.3/26] handle="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.973 [INFO][3499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:53.025031 env[1189]: 2025-05-17 00:42:52.973 [INFO][3499] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.3/26] IPv6=[] ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" HandleID="k8s-pod-network.4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:52.976 [INFO][3478] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0", GenerateName:"calico-kube-controllers-5d7c88f5f9-", Namespace:"calico-system", SelfLink:"", UID:"786617f2-a3ef-4787-996e-aecf8dd91826", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d7c88f5f9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"calico-kube-controllers-5d7c88f5f9-mnhgt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.122.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaf5ebb4be99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:52.977 [INFO][3478] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.3/32] ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:52.977 [INFO][3478] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaf5ebb4be99 ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:52.987 [INFO][3478] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:52.993 [INFO][3478] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0", GenerateName:"calico-kube-controllers-5d7c88f5f9-", Namespace:"calico-system", SelfLink:"", UID:"786617f2-a3ef-4787-996e-aecf8dd91826", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d7c88f5f9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226", Pod:"calico-kube-controllers-5d7c88f5f9-mnhgt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.122.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaf5ebb4be99", MAC:"0e:28:c2:91:23:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:53.025974 env[1189]: 2025-05-17 00:42:53.021 [INFO][3478] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226" Namespace="calico-system" Pod="calico-kube-controllers-5d7c88f5f9-mnhgt" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:42:53.045626 env[1189]: time="2025-05-17T00:42:53.045351172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:53.045626 env[1189]: time="2025-05-17T00:42:53.045402550Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:53.045626 env[1189]: time="2025-05-17T00:42:53.045414230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:53.047149 env[1189]: time="2025-05-17T00:42:53.046037046Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226 pid=3563 runtime=io.containerd.runc.v2 May 17 00:42:53.059440 systemd-networkd[1001]: caliaafaeae0843: Gained IPv6LL May 17 00:42:53.074432 systemd[1]: Started cri-containerd-4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226.scope. May 17 00:42:53.110000 audit[3581]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:53.110000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=23616 a0=3 a1=7ffdec09d2a0 a2=0 a3=7ffdec09d28c items=0 ppid=3182 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:53.139627 env[1189]: time="2025-05-17T00:42:53.139549909Z" level=info msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" May 17 00:42:53.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.153000 audit: BPF prog-id=166 op=LOAD May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3563 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393664336139656366633531333930306237323265353037333835 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3563 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393664336139656366633531333930306237323265353037333835 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit: BPF prog-id=167 op=LOAD May 17 00:42:53.154000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cc7f0 items=0 ppid=3563 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393664336139656366633531333930306237323265353037333835 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.154000 audit: BPF prog-id=168 op=LOAD May 17 00:42:53.154000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cc838 items=0 ppid=3563 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393664336139656366633531333930306237323265353037333835 May 17 00:42:53.155000 audit: BPF prog-id=168 op=UNLOAD May 17 00:42:53.155000 audit: BPF prog-id=167 op=UNLOAD May 17 00:42:53.155000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.155000 audit: BPF prog-id=169 op=LOAD May 17 00:42:53.155000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ccc48 items=0 ppid=3563 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393664336139656366633531333930306237323265353037333835 May 17 00:42:53.168645 env[1189]: time="2025-05-17T00:42:53.168583931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-9rdv2,Uid:69df8fb6-fba5-46ca-8889-9f55cf9bb0d5,Namespace:calico-system,Attempt:1,} returns sandbox id \"3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba\"" May 17 00:42:53.174648 env[1189]: time="2025-05-17T00:42:53.174586266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:42:53.215158 env[1189]: time="2025-05-17T00:42:53.215086629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d7c88f5f9-mnhgt,Uid:786617f2-a3ef-4787-996e-aecf8dd91826,Namespace:calico-system,Attempt:1,} returns sandbox id \"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226\"" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.273 [INFO][3606] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.274 [INFO][3606] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" iface="eth0" netns="/var/run/netns/cni-cb931082-be55-4e1e-63e0-9be6091cd81d" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.274 [INFO][3606] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" iface="eth0" netns="/var/run/netns/cni-cb931082-be55-4e1e-63e0-9be6091cd81d" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.274 [INFO][3606] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" iface="eth0" netns="/var/run/netns/cni-cb931082-be55-4e1e-63e0-9be6091cd81d" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.274 [INFO][3606] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.275 [INFO][3606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.317 [INFO][3621] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.317 [INFO][3621] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.317 [INFO][3621] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.328 [WARNING][3621] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.328 [INFO][3621] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.332 [INFO][3621] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:53.338817 env[1189]: 2025-05-17 00:42:53.335 [INFO][3606] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:42:53.340051 env[1189]: time="2025-05-17T00:42:53.339985201Z" level=info msg="TearDown network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" successfully" May 17 00:42:53.340221 env[1189]: time="2025-05-17T00:42:53.340192600Z" level=info msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" returns successfully" May 17 00:42:53.341633 env[1189]: time="2025-05-17T00:42:53.341580502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-8fw4b,Uid:a89fba32-b85c-4e8b-87f7-e3febd21938a,Namespace:calico-apiserver,Attempt:1,}" May 17 00:42:53.399248 env[1189]: time="2025-05-17T00:42:53.396377918Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:53.401349 env[1189]: time="2025-05-17T00:42:53.401262380Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:53.403173 kubelet[1936]: E0517 00:42:53.402669 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:53.403173 kubelet[1936]: E0517 00:42:53.402740 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:53.405573 kubelet[1936]: E0517 00:42:53.403103 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k5xm2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:53.406978 kubelet[1936]: E0517 00:42:53.406918 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:42:53.407501 env[1189]: time="2025-05-17T00:42:53.406674746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:42:53.443415 systemd-networkd[1001]: vxlan.calico: Gained IPv6LL May 17 00:42:53.585228 systemd-networkd[1001]: cali8337b433b9e: Link UP May 17 00:42:53.589656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:53.590921 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8337b433b9e: link becomes ready May 17 00:42:53.589886 systemd-networkd[1001]: cali8337b433b9e: Gained carrier May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.420 [INFO][3628] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0 calico-apiserver-57f4bb9567- calico-apiserver a89fba32-b85c-4e8b-87f7-e3febd21938a 1005 0 2025-05-17 00:42:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57f4bb9567 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc calico-apiserver-57f4bb9567-8fw4b eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8337b433b9e [] [] }} ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.420 [INFO][3628] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.483 [INFO][3640] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" HandleID="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.483 [INFO][3640] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" HandleID="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002348c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"calico-apiserver-57f4bb9567-8fw4b", "timestamp":"2025-05-17 00:42:53.483123502 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.483 [INFO][3640] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.483 [INFO][3640] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.483 [INFO][3640] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.497 [INFO][3640] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.509 [INFO][3640] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.521 [INFO][3640] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.525 [INFO][3640] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.544 [INFO][3640] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.544 [INFO][3640] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.548 [INFO][3640] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.559 [INFO][3640] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.572 [INFO][3640] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.4/26] block=192.168.122.0/26 handle="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.572 [INFO][3640] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.4/26] handle="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.572 [INFO][3640] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:53.624200 env[1189]: 2025-05-17 00:42:53.572 [INFO][3640] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.4/26] IPv6=[] ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" HandleID="k8s-pod-network.3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.576 [INFO][3628] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89fba32-b85c-4e8b-87f7-e3febd21938a", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"calico-apiserver-57f4bb9567-8fw4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8337b433b9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.576 [INFO][3628] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.4/32] ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.576 [INFO][3628] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8337b433b9e ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.591 [INFO][3628] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.598 [INFO][3628] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89fba32-b85c-4e8b-87f7-e3febd21938a", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f", Pod:"calico-apiserver-57f4bb9567-8fw4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8337b433b9e", MAC:"62:4d:a2:13:a1:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:53.625336 env[1189]: 2025-05-17 00:42:53.617 [INFO][3628] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-8fw4b" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:42:53.648276 env[1189]: time="2025-05-17T00:42:53.648052228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:53.648276 env[1189]: time="2025-05-17T00:42:53.648117698Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:53.648276 env[1189]: time="2025-05-17T00:42:53.648130104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:53.648903 env[1189]: time="2025-05-17T00:42:53.648813497Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f pid=3660 runtime=io.containerd.runc.v2 May 17 00:42:53.679000 audit[3678]: NETFILTER_CFG table=filter:109 family=2 entries=54 op=nft_register_chain pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:53.682671 kernel: kauditd_printk_skb: 731 callbacks suppressed May 17 00:42:53.682755 kernel: audit: type=1325 audit(1747442573.679:1188): table=filter:109 family=2 entries=54 op=nft_register_chain pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:53.674908 systemd[1]: Started cri-containerd-3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f.scope. May 17 00:42:53.679000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=29380 a0=3 a1=7ffd24f9aa10 a2=0 a3=7ffd24f9a9fc items=0 ppid=3182 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.691215 kernel: audit: type=1300 audit(1747442573.679:1188): arch=c000003e syscall=46 success=yes exit=29380 a0=3 a1=7ffd24f9aa10 a2=0 a3=7ffd24f9a9fc items=0 ppid=3182 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:53.697607 kernel: audit: type=1327 audit(1747442573.679:1188): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:53.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725066 kernel: audit: type=1400 audit(1747442573.717:1189): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725369 kernel: audit: type=1400 audit(1747442573.717:1190): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.732466 kernel: audit: type=1400 audit(1747442573.717:1191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.732659 kernel: audit: type=1400 audit(1747442573.717:1192): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.735902 kernel: audit: type=1400 audit(1747442573.717:1193): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.752109 kernel: audit: type=1400 audit(1747442573.717:1194): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.752424 kernel: audit: type=1400 audit(1747442573.717:1195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.721000 audit: BPF prog-id=170 op=LOAD May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303233636539363832306465313635376238663334333262363961 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303233636539363832306465313635376238663334333262363961 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit: BPF prog-id=171 op=LOAD May 17 00:42:53.724000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be850 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303233636539363832306465313635376238663334333262363961 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.724000 audit: BPF prog-id=172 op=LOAD May 17 00:42:53.724000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001be898 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303233636539363832306465313635376238663334333262363961 May 17 00:42:53.725000 audit: BPF prog-id=172 op=UNLOAD May 17 00:42:53.725000 audit: BPF prog-id=171 op=UNLOAD May 17 00:42:53.725000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:53.725000 audit: BPF prog-id=173 op=LOAD May 17 00:42:53.725000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001beca8 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:53.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303233636539363832306465313635376238663334333262363961 May 17 00:42:53.767987 systemd[1]: run-netns-cni\x2dcb931082\x2dbe55\x2d4e1e\x2d63e0\x2d9be6091cd81d.mount: Deactivated successfully. May 17 00:42:53.816269 env[1189]: time="2025-05-17T00:42:53.813782559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-8fw4b,Uid:a89fba32-b85c-4e8b-87f7-e3febd21938a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f\"" May 17 00:42:53.890465 systemd-networkd[1001]: cali467445eb7fe: Gained IPv6LL May 17 00:42:54.082517 systemd-networkd[1001]: caliaf5ebb4be99: Gained IPv6LL May 17 00:42:54.136883 env[1189]: time="2025-05-17T00:42:54.136823653Z" level=info msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.252 [INFO][3706] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.253 [INFO][3706] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" iface="eth0" netns="/var/run/netns/cni-7f9b259c-95af-d574-885c-344fac01afc4" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.253 [INFO][3706] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" iface="eth0" netns="/var/run/netns/cni-7f9b259c-95af-d574-885c-344fac01afc4" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.253 [INFO][3706] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" iface="eth0" netns="/var/run/netns/cni-7f9b259c-95af-d574-885c-344fac01afc4" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.254 [INFO][3706] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.254 [INFO][3706] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.337 [INFO][3713] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.338 [INFO][3713] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.338 [INFO][3713] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.361 [WARNING][3713] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.361 [INFO][3713] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.365 [INFO][3713] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:54.374850 env[1189]: 2025-05-17 00:42:54.367 [INFO][3706] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:42:54.376089 env[1189]: time="2025-05-17T00:42:54.376019440Z" level=info msg="TearDown network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" successfully" May 17 00:42:54.376280 env[1189]: time="2025-05-17T00:42:54.376242024Z" level=info msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" returns successfully" May 17 00:42:54.376573 systemd[1]: run-netns-cni\x2d7f9b259c\x2d95af\x2dd574\x2d885c\x2d344fac01afc4.mount: Deactivated successfully. May 17 00:42:54.378814 kubelet[1936]: E0517 00:42:54.378019 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:54.381352 env[1189]: time="2025-05-17T00:42:54.380033348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-7m7m2,Uid:87cf0124-38f8-4ee4-a4e5-afd52aa62583,Namespace:kube-system,Attempt:1,}" May 17 00:42:54.400232 kubelet[1936]: E0517 00:42:54.400066 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:42:54.578000 audit[3734]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:54.578000 audit[3734]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc21f49db0 a2=0 a3=7ffc21f49d9c items=0 ppid=2044 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:54.593000 audit[3734]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:54.593000 audit[3734]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc21f49db0 a2=0 a3=0 items=0 ppid=2044 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:54.786493 systemd-networkd[1001]: cali8337b433b9e: Gained IPv6LL May 17 00:42:54.842909 systemd-networkd[1001]: cali37a0bc6d448: Link UP May 17 00:42:54.847359 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:54.847516 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37a0bc6d448: link becomes ready May 17 00:42:54.847817 systemd-networkd[1001]: cali37a0bc6d448: Gained carrier May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.582 [INFO][3719] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0 coredns-674b8bbfcf- kube-system 87cf0124-38f8-4ee4-a4e5-afd52aa62583 1016 0 2025-05-17 00:42:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc coredns-674b8bbfcf-7m7m2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali37a0bc6d448 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.582 [INFO][3719] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.726 [INFO][3736] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" HandleID="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.727 [INFO][3736] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" HandleID="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d0260), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"coredns-674b8bbfcf-7m7m2", "timestamp":"2025-05-17 00:42:54.726952057 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.727 [INFO][3736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.727 [INFO][3736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.727 [INFO][3736] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.740 [INFO][3736] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.761 [INFO][3736] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.784 [INFO][3736] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.790 [INFO][3736] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.795 [INFO][3736] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.795 [INFO][3736] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.799 [INFO][3736] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.809 [INFO][3736] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.820 [INFO][3736] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.5/26] block=192.168.122.0/26 handle="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.820 [INFO][3736] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.5/26] handle="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.821 [INFO][3736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:54.885841 env[1189]: 2025-05-17 00:42:54.821 [INFO][3736] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.5/26] IPv6=[] ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" HandleID="k8s-pod-network.3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.828 [INFO][3719] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"87cf0124-38f8-4ee4-a4e5-afd52aa62583", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"coredns-674b8bbfcf-7m7m2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37a0bc6d448", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.828 [INFO][3719] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.5/32] ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.829 [INFO][3719] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali37a0bc6d448 ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.856 [INFO][3719] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.858 [INFO][3719] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"87cf0124-38f8-4ee4-a4e5-afd52aa62583", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd", Pod:"coredns-674b8bbfcf-7m7m2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37a0bc6d448", MAC:"8e:18:61:fb:6a:e0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:54.888029 env[1189]: 2025-05-17 00:42:54.882 [INFO][3719] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd" Namespace="kube-system" Pod="coredns-674b8bbfcf-7m7m2" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:42:54.952250 env[1189]: time="2025-05-17T00:42:54.952076747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:54.952624 env[1189]: time="2025-05-17T00:42:54.952571699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:54.952862 env[1189]: time="2025-05-17T00:42:54.952822029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:54.953647 env[1189]: time="2025-05-17T00:42:54.953533811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd pid=3757 runtime=io.containerd.runc.v2 May 17 00:42:54.971000 audit[3766]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=3766 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:54.971000 audit[3766]: SYSCALL arch=c000003e syscall=46 success=yes exit=24912 a0=3 a1=7ffde9e728f0 a2=0 a3=7ffde9e728dc items=0 ppid=3182 pid=3766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:55.023630 systemd[1]: run-containerd-runc-k8s.io-3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd-runc.oNVAKv.mount: Deactivated successfully. May 17 00:42:55.033959 systemd[1]: Started cri-containerd-3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd.scope. May 17 00:42:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.069000 audit: BPF prog-id=174 op=LOAD May 17 00:42:55.070000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.070000 audit[3767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3757 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332313233333962613235653565373638353034646431336231653234 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3757 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332313233333962613235653565373638353034646431336231653234 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.071000 audit: BPF prog-id=175 op=LOAD May 17 00:42:55.071000 audit[3767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024620 items=0 ppid=3757 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332313233333962613235653565373638353034646431336231653234 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.072000 audit: BPF prog-id=176 op=LOAD May 17 00:42:55.072000 audit[3767]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024668 items=0 ppid=3757 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332313233333962613235653565373638353034646431336231653234 May 17 00:42:55.073000 audit: BPF prog-id=176 op=UNLOAD May 17 00:42:55.074000 audit: BPF prog-id=175 op=UNLOAD May 17 00:42:55.074000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { perfmon } for pid=3767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit[3767]: AVC avc: denied { bpf } for pid=3767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.074000 audit: BPF prog-id=177 op=LOAD May 17 00:42:55.074000 audit[3767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024a78 items=0 ppid=3757 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332313233333962613235653565373638353034646431336231653234 May 17 00:42:55.163337 env[1189]: time="2025-05-17T00:42:55.163263848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-7m7m2,Uid:87cf0124-38f8-4ee4-a4e5-afd52aa62583,Namespace:kube-system,Attempt:1,} returns sandbox id \"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd\"" May 17 00:42:55.165314 kubelet[1936]: E0517 00:42:55.165142 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:55.201996 env[1189]: time="2025-05-17T00:42:55.201471432Z" level=info msg="CreateContainer within sandbox \"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:42:55.228599 env[1189]: time="2025-05-17T00:42:55.228522607Z" level=info msg="CreateContainer within sandbox \"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0e13a504984e9c3d4cd73b969482a0cefc93acf1ff7e13217a062ee31b2f7d36\"" May 17 00:42:55.237579 env[1189]: time="2025-05-17T00:42:55.237530293Z" level=info msg="StartContainer for \"0e13a504984e9c3d4cd73b969482a0cefc93acf1ff7e13217a062ee31b2f7d36\"" May 17 00:42:55.239832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3540752591.mount: Deactivated successfully. May 17 00:42:55.287444 systemd[1]: Started cri-containerd-0e13a504984e9c3d4cd73b969482a0cefc93acf1ff7e13217a062ee31b2f7d36.scope. May 17 00:42:55.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.328000 audit: BPF prog-id=178 op=LOAD May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3757 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313361353034393834653963336434636437336239363934383261 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3757 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313361353034393834653963336434636437336239363934383261 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit: BPF prog-id=179 op=LOAD May 17 00:42:55.331000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000244a30 items=0 ppid=3757 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313361353034393834653963336434636437336239363934383261 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.331000 audit: BPF prog-id=180 op=LOAD May 17 00:42:55.331000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000244a78 items=0 ppid=3757 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313361353034393834653963336434636437336239363934383261 May 17 00:42:55.332000 audit: BPF prog-id=180 op=UNLOAD May 17 00:42:55.332000 audit: BPF prog-id=179 op=UNLOAD May 17 00:42:55.332000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:55.332000 audit: BPF prog-id=181 op=LOAD May 17 00:42:55.332000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000244e88 items=0 ppid=3757 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313361353034393834653963336434636437336239363934383261 May 17 00:42:55.357037 env[1189]: time="2025-05-17T00:42:55.356963915Z" level=info msg="StartContainer for \"0e13a504984e9c3d4cd73b969482a0cefc93acf1ff7e13217a062ee31b2f7d36\" returns successfully" May 17 00:42:55.407856 kubelet[1936]: E0517 00:42:55.407310 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:55.461000 audit[3829]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:55.461000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd07907730 a2=0 a3=7ffd0790771c items=0 ppid=2044 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:55.467000 audit[3829]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:55.467000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd07907730 a2=0 a3=0 items=0 ppid=2044 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:55.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:55.532000 audit[3811]: AVC avc: denied { getattr } for pid=3811 comm="coredns" path="cgroup:[4026532460]" dev="nsfs" ino=4026532460 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c673 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:42:55.532000 audit[3811]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000118780 a2=c000107218 a3=0 items=0 ppid=3757 pid=3811 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c673 key=(null) May 17 00:42:55.532000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:42:55.559941 kubelet[1936]: I0517 00:42:55.559822 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:55.854816 kubelet[1936]: I0517 00:42:55.854724 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-7m7m2" podStartSLOduration=41.854684127 podStartE2EDuration="41.854684127s" podCreationTimestamp="2025-05-17 00:42:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:55.432478633 +0000 UTC m=+44.665037163" watchObservedRunningTime="2025-05-17 00:42:55.854684127 +0000 UTC m=+45.087242712" May 17 00:42:56.002582 systemd-networkd[1001]: cali37a0bc6d448: Gained IPv6LL May 17 00:42:56.137323 env[1189]: time="2025-05-17T00:42:56.136384054Z" level=info msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.288 [INFO][3888] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.288 [INFO][3888] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" iface="eth0" netns="/var/run/netns/cni-d131f1cd-bf8c-8d0d-5516-4295098a8d86" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.294 [INFO][3888] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" iface="eth0" netns="/var/run/netns/cni-d131f1cd-bf8c-8d0d-5516-4295098a8d86" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.294 [INFO][3888] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" iface="eth0" netns="/var/run/netns/cni-d131f1cd-bf8c-8d0d-5516-4295098a8d86" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.294 [INFO][3888] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.294 [INFO][3888] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.352 [INFO][3895] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.352 [INFO][3895] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.352 [INFO][3895] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.361 [WARNING][3895] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.361 [INFO][3895] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.364 [INFO][3895] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:56.371227 env[1189]: 2025-05-17 00:42:56.368 [INFO][3888] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:42:56.379554 systemd[1]: run-netns-cni\x2dd131f1cd\x2dbf8c\x2d8d0d\x2d5516\x2d4295098a8d86.mount: Deactivated successfully. May 17 00:42:56.381666 env[1189]: time="2025-05-17T00:42:56.381577070Z" level=info msg="TearDown network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" successfully" May 17 00:42:56.381864 env[1189]: time="2025-05-17T00:42:56.381827019Z" level=info msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" returns successfully" May 17 00:42:56.387139 kubelet[1936]: E0517 00:42:56.382619 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:56.390259 env[1189]: time="2025-05-17T00:42:56.390094854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ndw54,Uid:9593bbbb-d56b-40ff-9c1a-46287be24466,Namespace:kube-system,Attempt:1,}" May 17 00:42:56.454014 kubelet[1936]: E0517 00:42:56.453833 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:56.544000 audit[3913]: NETFILTER_CFG table=filter:115 family=2 entries=17 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.544000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd33248f10 a2=0 a3=7ffd33248efc items=0 ppid=2044 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.569000 audit[3913]: NETFILTER_CFG table=nat:116 family=2 entries=35 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.569000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd33248f10 a2=0 a3=7ffd33248efc items=0 ppid=2044 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.775974 systemd-networkd[1001]: calic70f00ef9e5: Link UP May 17 00:42:56.778785 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:56.778883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic70f00ef9e5: link becomes ready May 17 00:42:56.779345 systemd-networkd[1001]: calic70f00ef9e5: Gained carrier May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.576 [INFO][3901] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0 coredns-674b8bbfcf- kube-system 9593bbbb-d56b-40ff-9c1a-46287be24466 1040 0 2025-05-17 00:42:15 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc coredns-674b8bbfcf-ndw54 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic70f00ef9e5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.576 [INFO][3901] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.661 [INFO][3915] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" HandleID="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.661 [INFO][3915] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" HandleID="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9050), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"coredns-674b8bbfcf-ndw54", "timestamp":"2025-05-17 00:42:56.661525611 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.662 [INFO][3915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.662 [INFO][3915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.662 [INFO][3915] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.692 [INFO][3915] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.704 [INFO][3915] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.718 [INFO][3915] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.722 [INFO][3915] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.727 [INFO][3915] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.727 [INFO][3915] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.737 [INFO][3915] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86 May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.748 [INFO][3915] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.762 [INFO][3915] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.6/26] block=192.168.122.0/26 handle="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.762 [INFO][3915] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.6/26] handle="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.762 [INFO][3915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:56.811634 env[1189]: 2025-05-17 00:42:56.762 [INFO][3915] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.6/26] IPv6=[] ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" HandleID="k8s-pod-network.f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.767 [INFO][3901] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9593bbbb-d56b-40ff-9c1a-46287be24466", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"coredns-674b8bbfcf-ndw54", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic70f00ef9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.767 [INFO][3901] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.6/32] ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.767 [INFO][3901] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic70f00ef9e5 ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.780 [INFO][3901] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.784 [INFO][3901] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9593bbbb-d56b-40ff-9c1a-46287be24466", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86", Pod:"coredns-674b8bbfcf-ndw54", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic70f00ef9e5", MAC:"7a:a6:1d:39:02:60", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:56.813299 env[1189]: 2025-05-17 00:42:56.806 [INFO][3901] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86" Namespace="kube-system" Pod="coredns-674b8bbfcf-ndw54" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:42:56.872427 env[1189]: time="2025-05-17T00:42:56.872271172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:56.874381 env[1189]: time="2025-05-17T00:42:56.874296791Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:56.874600 env[1189]: time="2025-05-17T00:42:56.874390418Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:56.874827 env[1189]: time="2025-05-17T00:42:56.874773210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86 pid=3936 runtime=io.containerd.runc.v2 May 17 00:42:56.914872 systemd[1]: Started cri-containerd-f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86.scope. May 17 00:42:56.979000 audit[3963]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:56.979000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7fffc2ba94b0 a2=0 a3=7fffc2ba949c items=0 ppid=3182 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.989000 audit: BPF prog-id=182 op=LOAD May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3936 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316137353863323939663661316339376564643635666535303061 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3936 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316137353863323939663661316339376564643635666535303061 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit: BPF prog-id=183 op=LOAD May 17 00:42:56.990000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000301a70 items=0 ppid=3936 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316137353863323939663661316339376564643635666535303061 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.990000 audit: BPF prog-id=184 op=LOAD May 17 00:42:56.990000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000301ab8 items=0 ppid=3936 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316137353863323939663661316339376564643635666535303061 May 17 00:42:56.991000 audit: BPF prog-id=184 op=UNLOAD May 17 00:42:56.991000 audit: BPF prog-id=183 op=UNLOAD May 17 00:42:56.991000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.991000 audit: BPF prog-id=185 op=LOAD May 17 00:42:56.991000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301ec8 items=0 ppid=3936 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316137353863323939663661316339376564643635666535303061 May 17 00:42:57.046923 env[1189]: time="2025-05-17T00:42:57.046864261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ndw54,Uid:9593bbbb-d56b-40ff-9c1a-46287be24466,Namespace:kube-system,Attempt:1,} returns sandbox id \"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86\"" May 17 00:42:57.048505 kubelet[1936]: E0517 00:42:57.048061 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:57.053367 env[1189]: time="2025-05-17T00:42:57.053300884Z" level=info msg="CreateContainer within sandbox \"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:42:57.077475 env[1189]: time="2025-05-17T00:42:57.077401399Z" level=info msg="CreateContainer within sandbox \"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fc699321f7d0dcbec21ad516feef1eadef93507053a75bab914d8ebf56d985e8\"" May 17 00:42:57.078397 env[1189]: time="2025-05-17T00:42:57.078346973Z" level=info msg="StartContainer for \"fc699321f7d0dcbec21ad516feef1eadef93507053a75bab914d8ebf56d985e8\"" May 17 00:42:57.137375 systemd[1]: Started cri-containerd-fc699321f7d0dcbec21ad516feef1eadef93507053a75bab914d8ebf56d985e8.scope. May 17 00:42:57.151699 env[1189]: time="2025-05-17T00:42:57.151643751Z" level=info msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" May 17 00:42:57.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.189000 audit: BPF prog-id=186 op=LOAD May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3936 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663363939333231663764306463626563323161643531366665656631 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3936 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663363939333231663764306463626563323161643531366665656631 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.190000 audit: BPF prog-id=187 op=LOAD May 17 00:42:57.190000 audit[3979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000390ff0 items=0 ppid=3936 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663363939333231663764306463626563323161643531366665656631 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit: BPF prog-id=188 op=LOAD May 17 00:42:57.191000 audit[3979]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000391038 items=0 ppid=3936 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663363939333231663764306463626563323161643531366665656631 May 17 00:42:57.191000 audit: BPF prog-id=188 op=UNLOAD May 17 00:42:57.191000 audit: BPF prog-id=187 op=UNLOAD May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:57.191000 audit: BPF prog-id=189 op=LOAD May 17 00:42:57.191000 audit[3979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000391448 items=0 ppid=3936 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663363939333231663764306463626563323161643531366665656631 May 17 00:42:57.257274 env[1189]: time="2025-05-17T00:42:57.257214999Z" level=info msg="StartContainer for \"fc699321f7d0dcbec21ad516feef1eadef93507053a75bab914d8ebf56d985e8\" returns successfully" May 17 00:42:57.315000 audit[3990]: AVC avc: denied { getattr } for pid=3990 comm="coredns" path="cgroup:[4026532470]" dev="nsfs" ino=4026532470 scontext=system_u:system_r:svirt_lxc_net_t:s0:c508,c532 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:42:57.315000 audit[3990]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aac8 a2=c000495b08 a3=0 items=0 ppid=3936 pid=3990 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c508,c532 key=(null) May 17 00:42:57.315000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.350 [INFO][4005] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.351 [INFO][4005] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" iface="eth0" netns="/var/run/netns/cni-98a54fd4-774b-8e0d-bbbb-dfd161c98bf9" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.351 [INFO][4005] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" iface="eth0" netns="/var/run/netns/cni-98a54fd4-774b-8e0d-bbbb-dfd161c98bf9" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.351 [INFO][4005] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" iface="eth0" netns="/var/run/netns/cni-98a54fd4-774b-8e0d-bbbb-dfd161c98bf9" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.351 [INFO][4005] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.351 [INFO][4005] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.413 [INFO][4024] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.414 [INFO][4024] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.414 [INFO][4024] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.429 [WARNING][4024] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.429 [INFO][4024] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.435 [INFO][4024] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:57.447990 env[1189]: 2025-05-17 00:42:57.444 [INFO][4005] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:42:57.451381 env[1189]: time="2025-05-17T00:42:57.451287149Z" level=info msg="TearDown network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" successfully" May 17 00:42:57.451381 env[1189]: time="2025-05-17T00:42:57.451370689Z" level=info msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" returns successfully" May 17 00:42:57.454520 env[1189]: time="2025-05-17T00:42:57.453968769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-gds4d,Uid:7789b832-4c09-4541-a716-5a25dc213c2f,Namespace:calico-apiserver,Attempt:1,}" May 17 00:42:57.499609 kubelet[1936]: E0517 00:42:57.499559 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:57.500757 kubelet[1936]: E0517 00:42:57.500715 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:57.537897 kubelet[1936]: I0517 00:42:57.537625 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-ndw54" podStartSLOduration=42.53759164 podStartE2EDuration="42.53759164s" podCreationTimestamp="2025-05-17 00:42:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:57.53641227 +0000 UTC m=+46.768970798" watchObservedRunningTime="2025-05-17 00:42:57.53759164 +0000 UTC m=+46.770150166" May 17 00:42:57.838292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:57.838441 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali136f2d6d65e: link becomes ready May 17 00:42:57.838052 systemd-networkd[1001]: cali136f2d6d65e: Link UP May 17 00:42:57.838275 systemd-networkd[1001]: cali136f2d6d65e: Gained carrier May 17 00:42:57.860000 audit[4058]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:57.860000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff2297a1d0 a2=0 a3=7fff2297a1bc items=0 ppid=2044 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.616 [INFO][4034] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0 calico-apiserver-57f4bb9567- calico-apiserver 7789b832-4c09-4541-a716-5a25dc213c2f 1059 0 2025-05-17 00:42:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57f4bb9567 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc calico-apiserver-57f4bb9567-gds4d eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali136f2d6d65e [] [] }} ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.616 [INFO][4034] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.753 [INFO][4051] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" HandleID="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.754 [INFO][4051] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" HandleID="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"calico-apiserver-57f4bb9567-gds4d", "timestamp":"2025-05-17 00:42:57.753755675 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.754 [INFO][4051] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.754 [INFO][4051] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.754 [INFO][4051] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.765 [INFO][4051] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.777 [INFO][4051] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.792 [INFO][4051] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.796 [INFO][4051] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.801 [INFO][4051] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.801 [INFO][4051] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.805 [INFO][4051] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8 May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.816 [INFO][4051] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.828 [INFO][4051] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.7/26] block=192.168.122.0/26 handle="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.829 [INFO][4051] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.7/26] handle="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.829 [INFO][4051] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:57.870970 env[1189]: 2025-05-17 00:42:57.829 [INFO][4051] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.7/26] IPv6=[] ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" HandleID="k8s-pod-network.b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.833 [INFO][4034] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"7789b832-4c09-4541-a716-5a25dc213c2f", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"calico-apiserver-57f4bb9567-gds4d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali136f2d6d65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.834 [INFO][4034] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.7/32] ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.834 [INFO][4034] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali136f2d6d65e ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.841 [INFO][4034] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.841 [INFO][4034] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"7789b832-4c09-4541-a716-5a25dc213c2f", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8", Pod:"calico-apiserver-57f4bb9567-gds4d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali136f2d6d65e", MAC:"d6:cf:b4:01:be:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:57.872050 env[1189]: 2025-05-17 00:42:57.860 [INFO][4034] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8" Namespace="calico-apiserver" Pod="calico-apiserver-57f4bb9567-gds4d" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:42:57.894000 audit[4058]: NETFILTER_CFG table=nat:119 family=2 entries=56 op=nft_register_chain pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:57.894000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff2297a1d0 a2=0 a3=7fff2297a1bc items=0 ppid=2044 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:57.935692 env[1189]: time="2025-05-17T00:42:57.935570769Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:57.935902 env[1189]: time="2025-05-17T00:42:57.935652012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:57.935902 env[1189]: time="2025-05-17T00:42:57.935688218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:57.936224 env[1189]: time="2025-05-17T00:42:57.936069588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8 pid=4075 runtime=io.containerd.runc.v2 May 17 00:42:57.973219 systemd[1]: run-containerd-runc-k8s.io-fc699321f7d0dcbec21ad516feef1eadef93507053a75bab914d8ebf56d985e8-runc.WGkZMj.mount: Deactivated successfully. May 17 00:42:57.973381 systemd[1]: run-netns-cni\x2d98a54fd4\x2d774b\x2d8e0d\x2dbbbb\x2ddfd161c98bf9.mount: Deactivated successfully. May 17 00:42:57.991452 env[1189]: time="2025-05-17T00:42:57.991387293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:57.991000 audit[4090]: NETFILTER_CFG table=filter:120 family=2 entries=14 op=nft_register_rule pid=4090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:57.991000 audit[4090]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd13e99b30 a2=0 a3=7ffd13e99b1c items=0 ppid=2044 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:57.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:57.997215 env[1189]: time="2025-05-17T00:42:57.996631481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:58.001050 env[1189]: time="2025-05-17T00:42:58.000979523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:58.011000 audit[4090]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:58.011000 audit[4090]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd13e99b30 a2=0 a3=7ffd13e99b1c items=0 ppid=2044 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:58.022705 env[1189]: time="2025-05-17T00:42:58.013804624Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:58.022705 env[1189]: time="2025-05-17T00:42:58.014349417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:42:58.027814 env[1189]: time="2025-05-17T00:42:58.026015646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:42:58.039631 systemd[1]: run-containerd-runc-k8s.io-b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8-runc.P45hv2.mount: Deactivated successfully. May 17 00:42:58.081457 systemd[1]: Started cri-containerd-b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8.scope. May 17 00:42:58.085000 audit[4096]: NETFILTER_CFG table=filter:122 family=2 entries=53 op=nft_register_chain pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:58.095366 env[1189]: time="2025-05-17T00:42:58.095198392Z" level=info msg="CreateContainer within sandbox \"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:42:58.085000 audit[4096]: SYSCALL arch=c000003e syscall=46 success=yes exit=26624 a0=3 a1=7fff36b68100 a2=0 a3=7fff36b680ec items=0 ppid=3182 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:58.119948 env[1189]: time="2025-05-17T00:42:58.119863225Z" level=info msg="CreateContainer within sandbox \"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb\"" May 17 00:42:58.121208 env[1189]: time="2025-05-17T00:42:58.121117384Z" level=info msg="StartContainer for \"5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb\"" May 17 00:42:58.168429 systemd[1]: Started cri-containerd-5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb.scope. May 17 00:42:58.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.174000 audit: BPF prog-id=190 op=LOAD May 17 00:42:58.180000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.180000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4075 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313431343132326533613331303461316438666364373164663766 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4075 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313431343132326533613331303461316438666364373164663766 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.186000 audit: BPF prog-id=191 op=LOAD May 17 00:42:58.186000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f0b50 items=0 ppid=4075 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313431343132326533613331303461316438666364373164663766 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit: BPF prog-id=192 op=LOAD May 17 00:42:58.187000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f0b98 items=0 ppid=4075 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313431343132326533613331303461316438666364373164663766 May 17 00:42:58.187000 audit: BPF prog-id=192 op=UNLOAD May 17 00:42:58.187000 audit: BPF prog-id=191 op=UNLOAD May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.187000 audit: BPF prog-id=193 op=LOAD May 17 00:42:58.187000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f0fa8 items=0 ppid=4075 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313431343132326533613331303461316438666364373164663766 May 17 00:42:58.180353 systemd-networkd[1001]: calic70f00ef9e5: Gained IPv6LL May 17 00:42:58.259015 env[1189]: time="2025-05-17T00:42:58.258949956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f4bb9567-gds4d,Uid:7789b832-4c09-4541-a716-5a25dc213c2f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8\"" May 17 00:42:58.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.265000 audit: BPF prog-id=194 op=LOAD May 17 00:42:58.268000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.268000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3563 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613865363436393861386331393934333133313338633330313662 May 17 00:42:58.275000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.275000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3563 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613865363436393861386331393934333133313338633330313662 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.276000 audit: BPF prog-id=195 op=LOAD May 17 00:42:58.276000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383300 items=0 ppid=3563 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613865363436393861386331393934333133313338633330313662 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.277000 audit: BPF prog-id=196 op=LOAD May 17 00:42:58.277000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383348 items=0 ppid=3563 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613865363436393861386331393934333133313338633330313662 May 17 00:42:58.279000 audit: BPF prog-id=196 op=UNLOAD May 17 00:42:58.279000 audit: BPF prog-id=195 op=UNLOAD May 17 00:42:58.279000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:58.279000 audit: BPF prog-id=197 op=LOAD May 17 00:42:58.279000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000383758 items=0 ppid=3563 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613865363436393861386331393934333133313338633330313662 May 17 00:42:58.352617 env[1189]: time="2025-05-17T00:42:58.352463068Z" level=info msg="StartContainer for \"5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb\" returns successfully" May 17 00:42:58.506311 kubelet[1936]: E0517 00:42:58.505358 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:58.507392 kubelet[1936]: E0517 00:42:58.507343 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:58.680581 kubelet[1936]: I0517 00:42:58.680419 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5d7c88f5f9-mnhgt" podStartSLOduration=23.873041329 podStartE2EDuration="28.680395469s" podCreationTimestamp="2025-05-17 00:42:30 +0000 UTC" firstStartedPulling="2025-05-17 00:42:53.218180451 +0000 UTC m=+42.450738969" lastFinishedPulling="2025-05-17 00:42:58.025534587 +0000 UTC m=+47.258093109" observedRunningTime="2025-05-17 00:42:58.532762069 +0000 UTC m=+47.765320674" watchObservedRunningTime="2025-05-17 00:42:58.680395469 +0000 UTC m=+47.912953993" May 17 00:42:59.154662 env[1189]: time="2025-05-17T00:42:59.154013136Z" level=info msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" May 17 00:42:59.203496 systemd-networkd[1001]: cali136f2d6d65e: Gained IPv6LL May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.347 [INFO][4187] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.348 [INFO][4187] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" iface="eth0" netns="/var/run/netns/cni-d3a08fa4-3e34-335b-2a2c-b557d66b630e" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.348 [INFO][4187] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" iface="eth0" netns="/var/run/netns/cni-d3a08fa4-3e34-335b-2a2c-b557d66b630e" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.348 [INFO][4187] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" iface="eth0" netns="/var/run/netns/cni-d3a08fa4-3e34-335b-2a2c-b557d66b630e" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.348 [INFO][4187] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.348 [INFO][4187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.440 [INFO][4194] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.440 [INFO][4194] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.441 [INFO][4194] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.450 [WARNING][4194] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.450 [INFO][4194] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.453 [INFO][4194] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:59.461655 env[1189]: 2025-05-17 00:42:59.457 [INFO][4187] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:42:59.468807 systemd[1]: run-netns-cni\x2dd3a08fa4\x2d3e34\x2d335b\x2d2a2c\x2db557d66b630e.mount: Deactivated successfully. May 17 00:42:59.473096 env[1189]: time="2025-05-17T00:42:59.473032694Z" level=info msg="TearDown network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" successfully" May 17 00:42:59.473096 env[1189]: time="2025-05-17T00:42:59.473086559Z" level=info msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" returns successfully" May 17 00:42:59.474283 env[1189]: time="2025-05-17T00:42:59.474240531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6tr9,Uid:6c4ba804-0798-4f38-8a09-cb1a05bf6cea,Namespace:calico-system,Attempt:1,}" May 17 00:42:59.512527 kubelet[1936]: E0517 00:42:59.512372 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:42:59.721343 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:59.721643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib3f7b3f61b8: link becomes ready May 17 00:42:59.722841 systemd-networkd[1001]: calib3f7b3f61b8: Link UP May 17 00:42:59.723136 systemd-networkd[1001]: calib3f7b3f61b8: Gained carrier May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.567 [INFO][4200] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0 csi-node-driver- calico-system 6c4ba804-0798-4f38-8a09-cb1a05bf6cea 1093 0 2025-05-17 00:42:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-c83c2ac4fc csi-node-driver-t6tr9 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib3f7b3f61b8 [] [] }} ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.568 [INFO][4200] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.631 [INFO][4213] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" HandleID="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.632 [INFO][4213] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" HandleID="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-c83c2ac4fc", "pod":"csi-node-driver-t6tr9", "timestamp":"2025-05-17 00:42:59.631563294 +0000 UTC"}, Hostname:"ci-3510.3.7-n-c83c2ac4fc", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.632 [INFO][4213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.633 [INFO][4213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.633 [INFO][4213] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-c83c2ac4fc' May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.645 [INFO][4213] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.657 [INFO][4213] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.673 [INFO][4213] ipam/ipam.go 511: Trying affinity for 192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.677 [INFO][4213] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.683 [INFO][4213] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.0/26 host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.683 [INFO][4213] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.0/26 handle="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.686 [INFO][4213] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.696 [INFO][4213] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.0/26 handle="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.709 [INFO][4213] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.8/26] block=192.168.122.0/26 handle="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.709 [INFO][4213] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.8/26] handle="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" host="ci-3510.3.7-n-c83c2ac4fc" May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.709 [INFO][4213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:59.750062 env[1189]: 2025-05-17 00:42:59.709 [INFO][4213] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.8/26] IPv6=[] ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" HandleID="k8s-pod-network.1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.712 [INFO][4200] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c4ba804-0798-4f38-8a09-cb1a05bf6cea", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"", Pod:"csi-node-driver-t6tr9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib3f7b3f61b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.712 [INFO][4200] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.8/32] ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.712 [INFO][4200] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib3f7b3f61b8 ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.718 [INFO][4200] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.725 [INFO][4200] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c4ba804-0798-4f38-8a09-cb1a05bf6cea", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a", Pod:"csi-node-driver-t6tr9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib3f7b3f61b8", MAC:"c6:fd:b0:0d:68:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:59.751585 env[1189]: 2025-05-17 00:42:59.746 [INFO][4200] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a" Namespace="calico-system" Pod="csi-node-driver-t6tr9" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:42:59.766705 env[1189]: time="2025-05-17T00:42:59.766612251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:59.766923 env[1189]: time="2025-05-17T00:42:59.766705937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:59.766923 env[1189]: time="2025-05-17T00:42:59.766741834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:59.766923 env[1189]: time="2025-05-17T00:42:59.766897845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a pid=4234 runtime=io.containerd.runc.v2 May 17 00:42:59.800846 systemd[1]: Started cri-containerd-1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a.scope. May 17 00:42:59.814222 kernel: kauditd_printk_skb: 437 callbacks suppressed May 17 00:42:59.817478 kernel: audit: type=1325 audit(1747442579.809:1330): table=filter:123 family=2 entries=56 op=nft_register_chain pid=4253 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:59.817582 kernel: audit: type=1300 audit(1747442579.809:1330): arch=c000003e syscall=46 success=yes exit=25500 a0=3 a1=7ffe851b1910 a2=0 a3=7ffe851b18fc items=0 ppid=3182 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.817608 kernel: audit: type=1327 audit(1747442579.809:1330): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:59.809000 audit[4253]: NETFILTER_CFG table=filter:123 family=2 entries=56 op=nft_register_chain pid=4253 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:59.809000 audit[4253]: SYSCALL arch=c000003e syscall=46 success=yes exit=25500 a0=3 a1=7ffe851b1910 a2=0 a3=7ffe851b18fc items=0 ppid=3182 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.809000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:59.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.838141 kernel: audit: type=1400 audit(1747442579.831:1331): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.838345 kernel: audit: type=1400 audit(1747442579.831:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.838385 kernel: audit: type=1400 audit(1747442579.831:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.842633 kernel: audit: type=1400 audit(1747442579.831:1334): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.845622 kernel: audit: type=1400 audit(1747442579.831:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.845814 kernel: audit: type=1400 audit(1747442579.831:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.851651 kernel: audit: type=1400 audit(1747442579.831:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.832000 audit: BPF prog-id=198 op=LOAD May 17 00:42:59.832000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.832000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4234 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366133643930303436653330646435383230373037393365336335 May 17 00:42:59.832000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.832000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4234 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366133643930303436653330646435383230373037393365336335 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.833000 audit: BPF prog-id=199 op=LOAD May 17 00:42:59.833000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002fecd0 items=0 ppid=4234 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366133643930303436653330646435383230373037393365336335 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.834000 audit: BPF prog-id=200 op=LOAD May 17 00:42:59.834000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002fed18 items=0 ppid=4234 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366133643930303436653330646435383230373037393365336335 May 17 00:42:59.839000 audit: BPF prog-id=200 op=UNLOAD May 17 00:42:59.839000 audit: BPF prog-id=199 op=UNLOAD May 17 00:42:59.839000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:59.839000 audit: BPF prog-id=201 op=LOAD May 17 00:42:59.839000 audit[4243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002ff128 items=0 ppid=4234 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366133643930303436653330646435383230373037393365336335 May 17 00:42:59.871721 env[1189]: time="2025-05-17T00:42:59.871673367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6tr9,Uid:6c4ba804-0798-4f38-8a09-cb1a05bf6cea,Namespace:calico-system,Attempt:1,} returns sandbox id \"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a\"" May 17 00:43:00.878334 systemd-networkd[1001]: calib3f7b3f61b8: Gained IPv6LL May 17 00:43:02.293303 env[1189]: time="2025-05-17T00:43:02.293139380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.298952 env[1189]: time="2025-05-17T00:43:02.298880094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.302799 env[1189]: time="2025-05-17T00:43:02.302738728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.306028 env[1189]: time="2025-05-17T00:43:02.305964208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.308659 env[1189]: time="2025-05-17T00:43:02.307624317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:43:02.311642 env[1189]: time="2025-05-17T00:43:02.311153797Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:43:02.328666 env[1189]: time="2025-05-17T00:43:02.328589191Z" level=info msg="CreateContainer within sandbox \"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:43:02.347722 env[1189]: time="2025-05-17T00:43:02.347646127Z" level=info msg="CreateContainer within sandbox \"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c17f9c173a8ca47daacef8f04f8ae492599a7691f4d4f81b7983975d4f4c0869\"" May 17 00:43:02.348990 env[1189]: time="2025-05-17T00:43:02.348931245Z" level=info msg="StartContainer for \"c17f9c173a8ca47daacef8f04f8ae492599a7691f4d4f81b7983975d4f4c0869\"" May 17 00:43:02.394763 systemd[1]: Started cri-containerd-c17f9c173a8ca47daacef8f04f8ae492599a7691f4d4f81b7983975d4f4c0869.scope. May 17 00:43:02.426026 systemd[1]: run-containerd-runc-k8s.io-c17f9c173a8ca47daacef8f04f8ae492599a7691f4d4f81b7983975d4f4c0869-runc.Z6YoKn.mount: Deactivated successfully. May 17 00:43:02.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.513000 audit: BPF prog-id=202 op=LOAD May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3660 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:02.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376639633137336138636134376461616365663866303466386165 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3660 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:02.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376639633137336138636134376461616365663866303466386165 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit: BPF prog-id=203 op=LOAD May 17 00:43:02.514000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000390950 items=0 ppid=3660 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:02.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376639633137336138636134376461616365663866303466386165 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.514000 audit: BPF prog-id=204 op=LOAD May 17 00:43:02.514000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000390998 items=0 ppid=3660 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:02.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376639633137336138636134376461616365663866303466386165 May 17 00:43:02.514000 audit: BPF prog-id=204 op=UNLOAD May 17 00:43:02.514000 audit: BPF prog-id=203 op=UNLOAD May 17 00:43:02.515000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:02.515000 audit: BPF prog-id=205 op=LOAD May 17 00:43:02.515000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000390da8 items=0 ppid=3660 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:02.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376639633137336138636134376461616365663866303466386165 May 17 00:43:02.625488 env[1189]: time="2025-05-17T00:43:02.625313600Z" level=info msg="StartContainer for \"c17f9c173a8ca47daacef8f04f8ae492599a7691f4d4f81b7983975d4f4c0869\" returns successfully" May 17 00:43:02.693108 env[1189]: time="2025-05-17T00:43:02.693032695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.696373 env[1189]: time="2025-05-17T00:43:02.696303148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.699909 env[1189]: time="2025-05-17T00:43:02.699808980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.701344 env[1189]: time="2025-05-17T00:43:02.701145114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:43:02.703651 env[1189]: time="2025-05-17T00:43:02.703587639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:02.704402 env[1189]: time="2025-05-17T00:43:02.704358421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:43:02.723665 env[1189]: time="2025-05-17T00:43:02.723591518Z" level=info msg="CreateContainer within sandbox \"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:43:02.740430 env[1189]: time="2025-05-17T00:43:02.740362985Z" level=info msg="CreateContainer within sandbox \"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d2127e980a8ee1199d51c6a0fd0de88ff667930db5e8e91f72452c655e6c3cca\"" May 17 00:43:02.741766 env[1189]: time="2025-05-17T00:43:02.741644381Z" level=info msg="StartContainer for \"d2127e980a8ee1199d51c6a0fd0de88ff667930db5e8e91f72452c655e6c3cca\"" May 17 00:43:02.786002 systemd[1]: Started cri-containerd-d2127e980a8ee1199d51c6a0fd0de88ff667930db5e8e91f72452c655e6c3cca.scope. May 17 00:43:03.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.069000 audit: BPF prog-id=206 op=LOAD May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4075 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432313237653938306138656531313939643531633661306664306465 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4075 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432313237653938306138656531313939643531633661306664306465 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.070000 audit: BPF prog-id=207 op=LOAD May 17 00:43:03.070000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000348020 items=0 ppid=4075 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432313237653938306138656531313939643531633661306664306465 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.072000 audit: BPF prog-id=208 op=LOAD May 17 00:43:03.072000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000348068 items=0 ppid=4075 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432313237653938306138656531313939643531633661306664306465 May 17 00:43:03.072000 audit: BPF prog-id=208 op=UNLOAD May 17 00:43:03.072000 audit: BPF prog-id=207 op=UNLOAD May 17 00:43:03.073000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:03.073000 audit: BPF prog-id=209 op=LOAD May 17 00:43:03.073000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000348478 items=0 ppid=4075 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432313237653938306138656531313939643531633661306664306465 May 17 00:43:03.228826 env[1189]: time="2025-05-17T00:43:03.228765129Z" level=info msg="StartContainer for \"d2127e980a8ee1199d51c6a0fd0de88ff667930db5e8e91f72452c655e6c3cca\" returns successfully" May 17 00:43:03.736993 kubelet[1936]: I0517 00:43:03.732201 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57f4bb9567-8fw4b" podStartSLOduration=30.224026924 podStartE2EDuration="38.718626418s" podCreationTimestamp="2025-05-17 00:42:25 +0000 UTC" firstStartedPulling="2025-05-17 00:42:53.815823961 +0000 UTC m=+43.048382480" lastFinishedPulling="2025-05-17 00:43:02.310423468 +0000 UTC m=+51.542981974" observedRunningTime="2025-05-17 00:43:03.716570608 +0000 UTC m=+52.949129136" watchObservedRunningTime="2025-05-17 00:43:03.718626418 +0000 UTC m=+52.951184944" May 17 00:43:03.902000 audit[4354]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:03.902000 audit[4354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc5821730 a2=0 a3=7ffcc582171c items=0 ppid=2044 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:03.908000 audit[4354]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:03.908000 audit[4354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc5821730 a2=0 a3=7ffcc582171c items=0 ppid=2044 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:03.964000 audit[4356]: NETFILTER_CFG table=filter:126 family=2 entries=14 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:03.964000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc10efff80 a2=0 a3=7ffc10efff6c items=0 ppid=2044 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:03.981000 audit[4356]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:03.981000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc10efff80 a2=0 a3=7ffc10efff6c items=0 ppid=2044 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:04.269812 env[1189]: time="2025-05-17T00:43:04.269749699Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:04.271547 env[1189]: time="2025-05-17T00:43:04.271475603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:04.274232 env[1189]: time="2025-05-17T00:43:04.273763234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:04.277565 env[1189]: time="2025-05-17T00:43:04.277505401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:04.278614 env[1189]: time="2025-05-17T00:43:04.278571047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:43:04.290296 env[1189]: time="2025-05-17T00:43:04.290239358Z" level=info msg="CreateContainer within sandbox \"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:43:04.317034 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2005034404.mount: Deactivated successfully. May 17 00:43:04.330914 env[1189]: time="2025-05-17T00:43:04.330815829Z" level=info msg="CreateContainer within sandbox \"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"71b1646bdeba481867d1959f84ec2d6a08f151c65bee4ef885d06f92e9d0b017\"" May 17 00:43:04.332351 env[1189]: time="2025-05-17T00:43:04.332300187Z" level=info msg="StartContainer for \"71b1646bdeba481867d1959f84ec2d6a08f151c65bee4ef885d06f92e9d0b017\"" May 17 00:43:04.385714 systemd[1]: run-containerd-runc-k8s.io-71b1646bdeba481867d1959f84ec2d6a08f151c65bee4ef885d06f92e9d0b017-runc.qHPUZH.mount: Deactivated successfully. May 17 00:43:04.400806 systemd[1]: Started cri-containerd-71b1646bdeba481867d1959f84ec2d6a08f151c65bee4ef885d06f92e9d0b017.scope. May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ffb945f1cb8 items=0 ppid=4234 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623136343662646562613438313836376431393539663834656332 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit: BPF prog-id=210 op=LOAD May 17 00:43:04.488000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6aa8 items=0 ppid=4234 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623136343662646562613438313836376431393539663834656332 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.488000 audit: BPF prog-id=211 op=LOAD May 17 00:43:04.488000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6af8 items=0 ppid=4234 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:04.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623136343662646562613438313836376431393539663834656332 May 17 00:43:04.490000 audit: BPF prog-id=211 op=UNLOAD May 17 00:43:04.490000 audit: BPF prog-id=210 op=UNLOAD May 17 00:43:04.490000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.490000 audit: BPF prog-id=212 op=LOAD May 17 00:43:04.490000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6b88 items=0 ppid=4234 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623136343662646562613438313836376431393539663834656332 May 17 00:43:04.518615 env[1189]: time="2025-05-17T00:43:04.518514224Z" level=info msg="StartContainer for \"71b1646bdeba481867d1959f84ec2d6a08f151c65bee4ef885d06f92e9d0b017\" returns successfully" May 17 00:43:04.535199 env[1189]: time="2025-05-17T00:43:04.535116701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:43:04.665436 kubelet[1936]: I0517 00:43:04.665285 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:04.668235 kubelet[1936]: I0517 00:43:04.668110 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:05.073000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:05.075844 kernel: kauditd_printk_skb: 219 callbacks suppressed May 17 00:43:05.079108 kernel: audit: type=1400 audit(1747442585.073:1395): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:05.078000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:05.083254 kernel: audit: type=1400 audit(1747442585.078:1396): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:05.073000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002083aa0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:05.090212 kernel: audit: type=1300 audit(1747442585.073:1395): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002083aa0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:05.073000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:05.095302 kernel: audit: type=1327 audit(1747442585.073:1395): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:05.078000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007ce750 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:05.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:05.106092 kernel: audit: type=1300 audit(1747442585.078:1396): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007ce750 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:05.106261 kernel: audit: type=1327 audit(1747442585.078:1396): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:05.193800 kubelet[1936]: I0517 00:43:05.193702 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57f4bb9567-gds4d" podStartSLOduration=35.763802136 podStartE2EDuration="40.193679947s" podCreationTimestamp="2025-05-17 00:42:25 +0000 UTC" firstStartedPulling="2025-05-17 00:42:58.27390751 +0000 UTC m=+47.506466041" lastFinishedPulling="2025-05-17 00:43:02.70378533 +0000 UTC m=+51.936343852" observedRunningTime="2025-05-17 00:43:03.780430151 +0000 UTC m=+53.012988679" watchObservedRunningTime="2025-05-17 00:43:05.193679947 +0000 UTC m=+54.426238473" May 17 00:43:06.232000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.232000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.240607 kernel: audit: type=1400 audit(1747442586.232:1397): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.240915 kernel: audit: type=1400 audit(1747442586.232:1398): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.240977 kernel: audit: type=1300 audit(1747442586.232:1398): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012c43890 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.232000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012c43890 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.232000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.254266 kernel: audit: type=1327 audit(1747442586.232:1398): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.232000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c012ffc300 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.232000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.248000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.248000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c012c43cb0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.248000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.248000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.248000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c007f39d60 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.248000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.255000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524340 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.255000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00a94a150 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.269000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.269000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007f39fc0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:43:06.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:43:06.313713 env[1189]: time="2025-05-17T00:43:06.312420072Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:06.317464 env[1189]: time="2025-05-17T00:43:06.315565099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:06.318971 env[1189]: time="2025-05-17T00:43:06.318485341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:06.323503 env[1189]: time="2025-05-17T00:43:06.321916210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:06.323503 env[1189]: time="2025-05-17T00:43:06.322616969Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:43:06.329315 env[1189]: time="2025-05-17T00:43:06.329258342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:43:06.360622 env[1189]: time="2025-05-17T00:43:06.360554003Z" level=info msg="CreateContainer within sandbox \"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:43:06.383415 env[1189]: time="2025-05-17T00:43:06.383336291Z" level=info msg="CreateContainer within sandbox \"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"66f3b527ee0dc0465e11825a1f71671602d5039377ae3d763e778d2218698461\"" May 17 00:43:06.385019 env[1189]: time="2025-05-17T00:43:06.384864792Z" level=info msg="StartContainer for \"66f3b527ee0dc0465e11825a1f71671602d5039377ae3d763e778d2218698461\"" May 17 00:43:06.438885 systemd[1]: run-containerd-runc-k8s.io-66f3b527ee0dc0465e11825a1f71671602d5039377ae3d763e778d2218698461-runc.QorAKK.mount: Deactivated successfully. May 17 00:43:06.449829 systemd[1]: Started cri-containerd-66f3b527ee0dc0465e11825a1f71671602d5039377ae3d763e778d2218698461.scope. May 17 00:43:06.492448 systemd[1]: Started sshd@7-137.184.231.134:22-147.75.109.163:48648.service. May 17 00:43:06.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.231.134:22-147.75.109.163:48648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:06.573991 env[1189]: time="2025-05-17T00:43:06.572844644Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:06.573991 env[1189]: time="2025-05-17T00:43:06.573805912Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:06.587253 kubelet[1936]: E0517 00:43:06.582498 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:06.588083 kubelet[1936]: E0517 00:43:06.588030 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:06.619922 kubelet[1936]: E0517 00:43:06.619813 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9f96105e76194fff987cd18206f07c37,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:06.632047 env[1189]: time="2025-05-17T00:43:06.631968369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcef43d6368 items=0 ppid=4234 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:06.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663362353237656530646330343635653131383235613166373136 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.694000 audit: BPF prog-id=213 op=LOAD May 17 00:43:06.694000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00025fc88 items=0 ppid=4234 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:06.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663362353237656530646330343635653131383235613166373136 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit: BPF prog-id=214 op=LOAD May 17 00:43:06.695000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00025fcd8 items=0 ppid=4234 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:06.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663362353237656530646330343635653131383235613166373136 May 17 00:43:06.695000 audit: BPF prog-id=214 op=UNLOAD May 17 00:43:06.695000 audit: BPF prog-id=213 op=UNLOAD May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:06.695000 audit: BPF prog-id=215 op=LOAD May 17 00:43:06.695000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00025fd68 items=0 ppid=4234 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:06.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663362353237656530646330343635653131383235613166373136 May 17 00:43:06.701000 audit[4410]: USER_ACCT pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.702822 sshd[4410]: Accepted publickey for core from 147.75.109.163 port 48648 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:06.705000 audit[4410]: CRED_ACQ pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.705000 audit[4410]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3d74bf10 a2=3 a3=0 items=0 ppid=1 pid=4410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:06.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:06.714752 sshd[4410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:06.752267 systemd-logind[1177]: New session 8 of user core. May 17 00:43:06.752606 systemd[1]: Started session-8.scope. May 17 00:43:06.766061 env[1189]: time="2025-05-17T00:43:06.765480056Z" level=info msg="StartContainer for \"66f3b527ee0dc0465e11825a1f71671602d5039377ae3d763e778d2218698461\" returns successfully" May 17 00:43:06.777000 audit[4410]: USER_START pid=4410 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.780000 audit[4429]: CRED_ACQ pid=4429 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.881627 env[1189]: time="2025-05-17T00:43:06.881516590Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:06.883272 env[1189]: time="2025-05-17T00:43:06.883194725Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:06.884085 kubelet[1936]: E0517 00:43:06.884034 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:06.884399 kubelet[1936]: E0517 00:43:06.884352 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:06.884749 kubelet[1936]: E0517 00:43:06.884689 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:06.903746 kubelet[1936]: E0517 00:43:06.903680 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:43:07.416141 kubelet[1936]: I0517 00:43:07.413854 1936 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:43:07.416512 kubelet[1936]: I0517 00:43:07.416492 1936 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:43:07.875276 sshd[4410]: pam_unix(sshd:session): session closed for user core May 17 00:43:07.876000 audit[4410]: USER_END pid=4410 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:07.877000 audit[4410]: CRED_DISP pid=4410 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:07.880502 systemd[1]: sshd@7-137.184.231.134:22-147.75.109.163:48648.service: Deactivated successfully. May 17 00:43:07.882237 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:43:07.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.231.134:22-147.75.109.163:48648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:07.883732 systemd-logind[1177]: Session 8 logged out. Waiting for processes to exit. May 17 00:43:07.885108 systemd-logind[1177]: Removed session 8. May 17 00:43:07.908000 audit[4289]: AVC avc: denied { watch } for pid=4289 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_40.934682368/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c144,c831 tclass=file permissive=0 May 17 00:43:07.908000 audit[4289]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001c8c7c0 a2=fc6 a3=0 items=0 ppid=3660 pid=4289 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c831 key=(null) May 17 00:43:07.908000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:08.059000 audit[4325]: AVC avc: denied { watch } for pid=4325 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_40.2927453150/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c874,c1004 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c874,c1004 tclass=file permissive=0 May 17 00:43:08.059000 audit[4325]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eb4480 a2=fc6 a3=0 items=0 ppid=4075 pid=4325 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c874,c1004 key=(null) May 17 00:43:08.059000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:10.174851 env[1189]: time="2025-05-17T00:43:10.174511809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:43:10.209789 kubelet[1936]: I0517 00:43:10.208579 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-t6tr9" podStartSLOduration=33.748012883 podStartE2EDuration="40.20290842s" podCreationTimestamp="2025-05-17 00:42:30 +0000 UTC" firstStartedPulling="2025-05-17 00:42:59.874100739 +0000 UTC m=+49.106659244" lastFinishedPulling="2025-05-17 00:43:06.328996253 +0000 UTC m=+55.561554781" observedRunningTime="2025-05-17 00:43:07.879934617 +0000 UTC m=+57.112493143" watchObservedRunningTime="2025-05-17 00:43:10.20290842 +0000 UTC m=+59.435466985" May 17 00:43:10.384741 env[1189]: time="2025-05-17T00:43:10.384571800Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:10.385568 env[1189]: time="2025-05-17T00:43:10.385480380Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:10.385881 kubelet[1936]: E0517 00:43:10.385832 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:10.387907 kubelet[1936]: E0517 00:43:10.387839 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:10.389290 kubelet[1936]: E0517 00:43:10.389215 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k5xm2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:10.390884 kubelet[1936]: E0517 00:43:10.390815 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:43:11.054538 env[1189]: time="2025-05-17T00:43:11.053594093Z" level=info msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.367 [WARNING][4458] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.368 [INFO][4458] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.369 [INFO][4458] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" iface="eth0" netns="" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.369 [INFO][4458] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.369 [INFO][4458] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.598 [INFO][4468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.602 [INFO][4468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.602 [INFO][4468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.629 [WARNING][4468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.629 [INFO][4468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.635 [INFO][4468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:11.640883 env[1189]: 2025-05-17 00:43:11.638 [INFO][4458] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.643946 env[1189]: time="2025-05-17T00:43:11.640922674Z" level=info msg="TearDown network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" successfully" May 17 00:43:11.643946 env[1189]: time="2025-05-17T00:43:11.640960764Z" level=info msg="StopPodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" returns successfully" May 17 00:43:11.647790 env[1189]: time="2025-05-17T00:43:11.647721999Z" level=info msg="RemovePodSandbox for \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" May 17 00:43:11.648266 env[1189]: time="2025-05-17T00:43:11.648090222Z" level=info msg="Forcibly stopping sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\"" May 17 00:43:11.663914 kernel: kauditd_printk_skb: 74 callbacks suppressed May 17 00:43:11.669662 kernel: audit: type=1400 audit(1747442591.652:1420): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.669779 kernel: audit: type=1300 audit(1747442591.652:1420): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e7c040 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.679818 kernel: audit: type=1327 audit(1747442591.652:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.679937 kernel: audit: type=1400 audit(1747442591.658:1421): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.679975 kernel: audit: type=1300 audit(1747442591.658:1421): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e0da0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.652000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.652000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e7c040 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.658000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.658000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e0da0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.685261 kernel: audit: type=1327 audit(1747442591.658:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.685473 kernel: audit: type=1400 audit(1747442591.658:1422): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.658000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.658000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e7c080 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.695771 kernel: audit: type=1300 audit(1747442591.658:1422): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e7c080 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.695932 kernel: audit: type=1327 audit(1747442591.658:1422): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.699000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.706249 kernel: audit: type=1400 audit(1747442591.699:1423): avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:11.699000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e7c100 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:43:11.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.772 [WARNING][4482] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" WorkloadEndpoint="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.773 [INFO][4482] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.773 [INFO][4482] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" iface="eth0" netns="" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.773 [INFO][4482] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.773 [INFO][4482] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.839 [INFO][4489] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.840 [INFO][4489] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.840 [INFO][4489] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.852 [WARNING][4489] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.852 [INFO][4489] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" HandleID="k8s-pod-network.b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-whisker--57d7dc79cf--kwmsf-eth0" May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.861 [INFO][4489] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:11.876389 env[1189]: 2025-05-17 00:43:11.867 [INFO][4482] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913" May 17 00:43:11.877003 env[1189]: time="2025-05-17T00:43:11.876440591Z" level=info msg="TearDown network for sandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" successfully" May 17 00:43:11.881592 env[1189]: time="2025-05-17T00:43:11.881526263Z" level=info msg="RemovePodSandbox \"b66b554f8b8b8816f1af231ddc3c0fdcaa1767d6becd4f1f96c175346d926913\" returns successfully" May 17 00:43:11.882458 env[1189]: time="2025-05-17T00:43:11.882411209Z" level=info msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.003 [WARNING][4503] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"87cf0124-38f8-4ee4-a4e5-afd52aa62583", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd", Pod:"coredns-674b8bbfcf-7m7m2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37a0bc6d448", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.004 [INFO][4503] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.004 [INFO][4503] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" iface="eth0" netns="" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.004 [INFO][4503] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.004 [INFO][4503] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.058 [INFO][4510] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.059 [INFO][4510] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.059 [INFO][4510] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.073 [WARNING][4510] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.073 [INFO][4510] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.077 [INFO][4510] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:12.083114 env[1189]: 2025-05-17 00:43:12.080 [INFO][4503] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.084447 env[1189]: time="2025-05-17T00:43:12.083116231Z" level=info msg="TearDown network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" successfully" May 17 00:43:12.084447 env[1189]: time="2025-05-17T00:43:12.083161722Z" level=info msg="StopPodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" returns successfully" May 17 00:43:12.084955 env[1189]: time="2025-05-17T00:43:12.084901545Z" level=info msg="RemovePodSandbox for \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" May 17 00:43:12.085232 env[1189]: time="2025-05-17T00:43:12.085135569Z" level=info msg="Forcibly stopping sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\"" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.150 [WARNING][4524] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"87cf0124-38f8-4ee4-a4e5-afd52aa62583", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3212339ba25e5e768504dd13b1e241ed73649601db81bbd34c75d4a23c40f7bd", Pod:"coredns-674b8bbfcf-7m7m2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37a0bc6d448", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.154 [INFO][4524] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.155 [INFO][4524] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" iface="eth0" netns="" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.155 [INFO][4524] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.155 [INFO][4524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.200 [INFO][4532] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.200 [INFO][4532] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.204 [INFO][4532] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.214 [WARNING][4532] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.214 [INFO][4532] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" HandleID="k8s-pod-network.f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--7m7m2-eth0" May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.217 [INFO][4532] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:12.223355 env[1189]: 2025-05-17 00:43:12.220 [INFO][4524] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba" May 17 00:43:12.223355 env[1189]: time="2025-05-17T00:43:12.223208887Z" level=info msg="TearDown network for sandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" successfully" May 17 00:43:12.226538 env[1189]: time="2025-05-17T00:43:12.226463559Z" level=info msg="RemovePodSandbox \"f54685225794a3f7589d2685ac020ad077ee8e466946572e14a1b6ee4ba352ba\" returns successfully" May 17 00:43:12.227294 env[1189]: time="2025-05-17T00:43:12.227246662Z" level=info msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.306 [WARNING][4547] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba", Pod:"goldmane-78d55f7ddc-9rdv2", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.122.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali467445eb7fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.307 [INFO][4547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.307 [INFO][4547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" iface="eth0" netns="" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.307 [INFO][4547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.307 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.364 [INFO][4554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.365 [INFO][4554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.365 [INFO][4554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.378 [WARNING][4554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.378 [INFO][4554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.381 [INFO][4554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:12.386478 env[1189]: 2025-05-17 00:43:12.383 [INFO][4547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.386478 env[1189]: time="2025-05-17T00:43:12.386392732Z" level=info msg="TearDown network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" successfully" May 17 00:43:12.386478 env[1189]: time="2025-05-17T00:43:12.386434468Z" level=info msg="StopPodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" returns successfully" May 17 00:43:12.388775 env[1189]: time="2025-05-17T00:43:12.387905440Z" level=info msg="RemovePodSandbox for \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" May 17 00:43:12.388775 env[1189]: time="2025-05-17T00:43:12.387996486Z" level=info msg="Forcibly stopping sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\"" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.490 [WARNING][4570] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"69df8fb6-fba5-46ca-8889-9f55cf9bb0d5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3fba98b708769bb2ef614bdb43384e34b5bf7eb3689e69bc3772f3c2f08403ba", Pod:"goldmane-78d55f7ddc-9rdv2", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.122.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali467445eb7fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.493 [INFO][4570] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.493 [INFO][4570] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" iface="eth0" netns="" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.493 [INFO][4570] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.493 [INFO][4570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.569 [INFO][4581] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.569 [INFO][4581] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.569 [INFO][4581] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.592 [WARNING][4581] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.592 [INFO][4581] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" HandleID="k8s-pod-network.d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-goldmane--78d55f7ddc--9rdv2-eth0" May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.597 [INFO][4581] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:12.616595 env[1189]: 2025-05-17 00:43:12.600 [INFO][4570] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9" May 17 00:43:12.616595 env[1189]: time="2025-05-17T00:43:12.615584766Z" level=info msg="TearDown network for sandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" successfully" May 17 00:43:12.620056 env[1189]: time="2025-05-17T00:43:12.619957822Z" level=info msg="RemovePodSandbox \"d0e6eef2dd9f7bbabaf016eb7be30b052d68190f2555d11d0703d6031fde0ae9\" returns successfully" May 17 00:43:12.621429 env[1189]: time="2025-05-17T00:43:12.621357407Z" level=info msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" May 17 00:43:12.892285 systemd[1]: Started sshd@8-137.184.231.134:22-147.75.109.163:46584.service. May 17 00:43:12.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.231.134:22-147.75.109.163:46584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.803 [WARNING][4595] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0", GenerateName:"calico-kube-controllers-5d7c88f5f9-", Namespace:"calico-system", SelfLink:"", UID:"786617f2-a3ef-4787-996e-aecf8dd91826", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d7c88f5f9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226", Pod:"calico-kube-controllers-5d7c88f5f9-mnhgt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.122.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaf5ebb4be99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.803 [INFO][4595] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.804 [INFO][4595] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" iface="eth0" netns="" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.804 [INFO][4595] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.804 [INFO][4595] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.926 [INFO][4602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.927 [INFO][4602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.927 [INFO][4602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.970 [WARNING][4602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:12.970 [INFO][4602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:13.001 [INFO][4602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:13.005651 env[1189]: 2025-05-17 00:43:13.003 [INFO][4595] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.006900 env[1189]: time="2025-05-17T00:43:13.006558561Z" level=info msg="TearDown network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" successfully" May 17 00:43:13.006900 env[1189]: time="2025-05-17T00:43:13.006621685Z" level=info msg="StopPodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" returns successfully" May 17 00:43:13.008381 env[1189]: time="2025-05-17T00:43:13.007841753Z" level=info msg="RemovePodSandbox for \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" May 17 00:43:13.008381 env[1189]: time="2025-05-17T00:43:13.007884799Z" level=info msg="Forcibly stopping sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\"" May 17 00:43:13.051048 sshd[4607]: Accepted publickey for core from 147.75.109.163 port 46584 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:13.049000 audit[4607]: USER_ACCT pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:13.052000 audit[4607]: CRED_ACQ pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:13.052000 audit[4607]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd213b94f0 a2=3 a3=0 items=0 ppid=1 pid=4607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:13.052000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:13.057515 sshd[4607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:13.069655 systemd-logind[1177]: New session 9 of user core. May 17 00:43:13.070399 systemd[1]: Started session-9.scope. May 17 00:43:13.082000 audit[4607]: USER_START pid=4607 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:13.084000 audit[4623]: CRED_ACQ pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.119 [WARNING][4619] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0", GenerateName:"calico-kube-controllers-5d7c88f5f9-", Namespace:"calico-system", SelfLink:"", UID:"786617f2-a3ef-4787-996e-aecf8dd91826", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d7c88f5f9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"4896d3a9ecfc513900b722e50738576121c94a44417c3c0d07c1f6ce4b20d226", Pod:"calico-kube-controllers-5d7c88f5f9-mnhgt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.122.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaf5ebb4be99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.119 [INFO][4619] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.119 [INFO][4619] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" iface="eth0" netns="" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.119 [INFO][4619] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.119 [INFO][4619] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.210 [INFO][4627] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.212 [INFO][4627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.212 [INFO][4627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.245 [WARNING][4627] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.245 [INFO][4627] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" HandleID="k8s-pod-network.88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--kube--controllers--5d7c88f5f9--mnhgt-eth0" May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.249 [INFO][4627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:13.257732 env[1189]: 2025-05-17 00:43:13.253 [INFO][4619] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67" May 17 00:43:13.260047 env[1189]: time="2025-05-17T00:43:13.258376051Z" level=info msg="TearDown network for sandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" successfully" May 17 00:43:13.268493 env[1189]: time="2025-05-17T00:43:13.268322207Z" level=info msg="RemovePodSandbox \"88b6f10ea0bcb0aaa796bac7707c5609599c7ff9e4d29ae3dd034ed3acabef67\" returns successfully" May 17 00:43:13.270348 env[1189]: time="2025-05-17T00:43:13.269162546Z" level=info msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.400 [WARNING][4649] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89fba32-b85c-4e8b-87f7-e3febd21938a", ResourceVersion:"1117", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f", Pod:"calico-apiserver-57f4bb9567-8fw4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8337b433b9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.400 [INFO][4649] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.400 [INFO][4649] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" iface="eth0" netns="" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.400 [INFO][4649] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.400 [INFO][4649] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.443 [INFO][4656] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.444 [INFO][4656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.444 [INFO][4656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.474 [WARNING][4656] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.474 [INFO][4656] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.478 [INFO][4656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:13.487382 env[1189]: 2025-05-17 00:43:13.482 [INFO][4649] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.489373 env[1189]: time="2025-05-17T00:43:13.488305422Z" level=info msg="TearDown network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" successfully" May 17 00:43:13.489373 env[1189]: time="2025-05-17T00:43:13.488363822Z" level=info msg="StopPodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" returns successfully" May 17 00:43:13.489853 env[1189]: time="2025-05-17T00:43:13.489806384Z" level=info msg="RemovePodSandbox for \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" May 17 00:43:13.490097 env[1189]: time="2025-05-17T00:43:13.490047273Z" level=info msg="Forcibly stopping sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\"" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.576 [WARNING][4671] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89fba32-b85c-4e8b-87f7-e3febd21938a", ResourceVersion:"1117", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"3d023ce96820de1657b8f3432b69a4d3540f82115fdbb3891cf0081b0abb798f", Pod:"calico-apiserver-57f4bb9567-8fw4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8337b433b9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.577 [INFO][4671] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.577 [INFO][4671] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" iface="eth0" netns="" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.577 [INFO][4671] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.577 [INFO][4671] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.636 [INFO][4678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.637 [INFO][4678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.637 [INFO][4678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.649 [WARNING][4678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.649 [INFO][4678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" HandleID="k8s-pod-network.8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--8fw4b-eth0" May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.660 [INFO][4678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:13.668027 env[1189]: 2025-05-17 00:43:13.663 [INFO][4671] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22" May 17 00:43:13.669791 env[1189]: time="2025-05-17T00:43:13.668995089Z" level=info msg="TearDown network for sandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" successfully" May 17 00:43:13.678342 env[1189]: time="2025-05-17T00:43:13.678208068Z" level=info msg="RemovePodSandbox \"8881ce6ec2bd4bb32013b386e31681b5d043fab43797c97816604dcc0240da22\" returns successfully" May 17 00:43:13.703708 env[1189]: time="2025-05-17T00:43:13.703617410Z" level=info msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:13.895 [WARNING][4692] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"7789b832-4c09-4541-a716-5a25dc213c2f", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8", Pod:"calico-apiserver-57f4bb9567-gds4d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali136f2d6d65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:13.897 [INFO][4692] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:13.897 [INFO][4692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" iface="eth0" netns="" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:13.897 [INFO][4692] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:13.898 [INFO][4692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.034 [INFO][4699] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.034 [INFO][4699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.034 [INFO][4699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.055 [WARNING][4699] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.055 [INFO][4699] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.063 [INFO][4699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:14.083342 env[1189]: 2025-05-17 00:43:14.071 [INFO][4692] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.087626 env[1189]: time="2025-05-17T00:43:14.084621535Z" level=info msg="TearDown network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" successfully" May 17 00:43:14.087626 env[1189]: time="2025-05-17T00:43:14.084702229Z" level=info msg="StopPodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" returns successfully" May 17 00:43:14.088252 env[1189]: time="2025-05-17T00:43:14.088145241Z" level=info msg="RemovePodSandbox for \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" May 17 00:43:14.089908 env[1189]: time="2025-05-17T00:43:14.088771945Z" level=info msg="Forcibly stopping sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\"" May 17 00:43:14.163035 sshd[4607]: pam_unix(sshd:session): session closed for user core May 17 00:43:14.163000 audit[4607]: USER_END pid=4607 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:14.164000 audit[4607]: CRED_DISP pid=4607 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:14.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.231.134:22-147.75.109.163:46584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:14.168565 systemd[1]: sshd@8-137.184.231.134:22-147.75.109.163:46584.service: Deactivated successfully. May 17 00:43:14.170113 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:43:14.173555 systemd-logind[1177]: Session 9 logged out. Waiting for processes to exit. May 17 00:43:14.176433 systemd-logind[1177]: Removed session 9. May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.214 [WARNING][4715] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0", GenerateName:"calico-apiserver-57f4bb9567-", Namespace:"calico-apiserver", SelfLink:"", UID:"7789b832-4c09-4541-a716-5a25dc213c2f", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f4bb9567", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"b71414122e3a3104a1d8fcd71df7f21c4aa991bfaceeab877f1c02ec427997c8", Pod:"calico-apiserver-57f4bb9567-gds4d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.122.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali136f2d6d65e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.216 [INFO][4715] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.216 [INFO][4715] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" iface="eth0" netns="" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.216 [INFO][4715] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.216 [INFO][4715] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.269 [INFO][4723] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.270 [INFO][4723] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.270 [INFO][4723] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.294 [WARNING][4723] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.294 [INFO][4723] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" HandleID="k8s-pod-network.9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-calico--apiserver--57f4bb9567--gds4d-eth0" May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.299 [INFO][4723] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:14.305310 env[1189]: 2025-05-17 00:43:14.302 [INFO][4715] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6" May 17 00:43:14.305941 env[1189]: time="2025-05-17T00:43:14.305364036Z" level=info msg="TearDown network for sandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" successfully" May 17 00:43:14.310211 env[1189]: time="2025-05-17T00:43:14.310099262Z" level=info msg="RemovePodSandbox \"9e9687d684dc2f1a4b3159de0aaf69c52c8ac2bd5722ee5f3651c554faa0cfc6\" returns successfully" May 17 00:43:14.311012 env[1189]: time="2025-05-17T00:43:14.310963515Z" level=info msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.394 [WARNING][4737] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9593bbbb-d56b-40ff-9c1a-46287be24466", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86", Pod:"coredns-674b8bbfcf-ndw54", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic70f00ef9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.394 [INFO][4737] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.394 [INFO][4737] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" iface="eth0" netns="" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.394 [INFO][4737] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.394 [INFO][4737] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.459 [INFO][4744] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.460 [INFO][4744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.460 [INFO][4744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.472 [WARNING][4744] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.472 [INFO][4744] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.476 [INFO][4744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:14.486085 env[1189]: 2025-05-17 00:43:14.480 [INFO][4737] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.488662 env[1189]: time="2025-05-17T00:43:14.487713937Z" level=info msg="TearDown network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" successfully" May 17 00:43:14.488662 env[1189]: time="2025-05-17T00:43:14.487766411Z" level=info msg="StopPodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" returns successfully" May 17 00:43:14.489159 env[1189]: time="2025-05-17T00:43:14.489114955Z" level=info msg="RemovePodSandbox for \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" May 17 00:43:14.489939 env[1189]: time="2025-05-17T00:43:14.489386622Z" level=info msg="Forcibly stopping sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\"" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.562 [WARNING][4760] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9593bbbb-d56b-40ff-9c1a-46287be24466", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"f61a758c299f6a1c97edd65fe500a378ae74bd4fb6f7204fa27f7df5b4ce8e86", Pod:"coredns-674b8bbfcf-ndw54", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.122.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic70f00ef9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.563 [INFO][4760] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.563 [INFO][4760] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" iface="eth0" netns="" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.563 [INFO][4760] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.563 [INFO][4760] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.617 [INFO][4767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.617 [INFO][4767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.617 [INFO][4767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.627 [WARNING][4767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.627 [INFO][4767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" HandleID="k8s-pod-network.01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-coredns--674b8bbfcf--ndw54-eth0" May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.631 [INFO][4767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:14.637507 env[1189]: 2025-05-17 00:43:14.634 [INFO][4760] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82" May 17 00:43:14.639570 env[1189]: time="2025-05-17T00:43:14.638484348Z" level=info msg="TearDown network for sandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" successfully" May 17 00:43:14.644704 env[1189]: time="2025-05-17T00:43:14.644568329Z" level=info msg="RemovePodSandbox \"01527bf7d93ad8db3aa7a20bc14180dfe77f37c3ffceb95e5e162fd9d7603f82\" returns successfully" May 17 00:43:14.645908 env[1189]: time="2025-05-17T00:43:14.645848267Z" level=info msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.734 [WARNING][4782] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c4ba804-0798-4f38-8a09-cb1a05bf6cea", ResourceVersion:"1186", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a", Pod:"csi-node-driver-t6tr9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib3f7b3f61b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.735 [INFO][4782] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.735 [INFO][4782] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" iface="eth0" netns="" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.735 [INFO][4782] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.735 [INFO][4782] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.787 [INFO][4789] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.789 [INFO][4789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.789 [INFO][4789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.813 [WARNING][4789] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.814 [INFO][4789] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.820 [INFO][4789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:14.828821 env[1189]: 2025-05-17 00:43:14.823 [INFO][4782] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:14.829884 env[1189]: time="2025-05-17T00:43:14.829823145Z" level=info msg="TearDown network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" successfully" May 17 00:43:14.830043 env[1189]: time="2025-05-17T00:43:14.830013132Z" level=info msg="StopPodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" returns successfully" May 17 00:43:14.831309 env[1189]: time="2025-05-17T00:43:14.831257584Z" level=info msg="RemovePodSandbox for \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" May 17 00:43:14.832796 env[1189]: time="2025-05-17T00:43:14.832681925Z" level=info msg="Forcibly stopping sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\"" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.926 [WARNING][4805] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6c4ba804-0798-4f38-8a09-cb1a05bf6cea", ResourceVersion:"1186", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-c83c2ac4fc", ContainerID:"1a6a3d90046e30dd582070793e3c5eae06570c3bc1094e01f5e302123682315a", Pod:"csi-node-driver-t6tr9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib3f7b3f61b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.927 [INFO][4805] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.927 [INFO][4805] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" iface="eth0" netns="" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.927 [INFO][4805] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.927 [INFO][4805] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:14.994 [INFO][4812] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.007 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.007 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.025 [WARNING][4812] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.025 [INFO][4812] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" HandleID="k8s-pod-network.00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" Workload="ci--3510.3.7--n--c83c2ac4fc-k8s-csi--node--driver--t6tr9-eth0" May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.031 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:15.039790 env[1189]: 2025-05-17 00:43:15.035 [INFO][4805] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6" May 17 00:43:15.040976 env[1189]: time="2025-05-17T00:43:15.040913575Z" level=info msg="TearDown network for sandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" successfully" May 17 00:43:15.050805 env[1189]: time="2025-05-17T00:43:15.050691954Z" level=info msg="RemovePodSandbox \"00006c167049435ef49b9ae5f9674c9f7db6ac3256372f4a4b910fb47f51ccd6\" returns successfully" May 17 00:43:15.792840 kubelet[1936]: I0517 00:43:15.792749 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:16.291000 audit[4822]: NETFILTER_CFG table=filter:128 family=2 entries=13 op=nft_register_rule pid=4822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:16.291000 audit[4822]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd175a8450 a2=0 a3=7ffd175a843c items=0 ppid=2044 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:16.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:16.297000 audit[4822]: NETFILTER_CFG table=nat:129 family=2 entries=27 op=nft_register_chain pid=4822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:16.297000 audit[4822]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd175a8450 a2=0 a3=7ffd175a843c items=0 ppid=2044 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:16.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:19.176653 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 00:43:19.177155 kernel: audit: type=1130 audit(1747442599.174:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.231.134:22-147.75.109.163:60498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:19.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.231.134:22-147.75.109.163:60498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:19.175119 systemd[1]: Started sshd@9-137.184.231.134:22-147.75.109.163:60498.service. May 17 00:43:19.303000 audit[4824]: USER_ACCT pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.305658 sshd[4824]: Accepted publickey for core from 147.75.109.163 port 60498 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:19.307000 audit[4824]: CRED_ACQ pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.312124 kernel: audit: type=1101 audit(1747442599.303:1436): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.312312 kernel: audit: type=1103 audit(1747442599.307:1437): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.314672 sshd[4824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:19.315207 kernel: audit: type=1006 audit(1747442599.307:1438): pid=4824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:43:19.307000 audit[4824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f607e70 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.320479 kernel: audit: type=1300 audit(1747442599.307:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f607e70 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:19.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:19.324311 kernel: audit: type=1327 audit(1747442599.307:1438): proctitle=737368643A20636F7265205B707269765D May 17 00:43:19.329728 systemd-logind[1177]: New session 10 of user core. May 17 00:43:19.331130 systemd[1]: Started session-10.scope. May 17 00:43:19.340000 audit[4824]: USER_START pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.346279 kernel: audit: type=1105 audit(1747442599.340:1439): pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.346000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.353376 kernel: audit: type=1103 audit(1747442599.346:1440): pid=4826 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.971676 sshd[4824]: pam_unix(sshd:session): session closed for user core May 17 00:43:19.977000 audit[4824]: USER_END pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.981474 systemd[1]: Started sshd@10-137.184.231.134:22-147.75.109.163:60512.service. May 17 00:43:19.984677 kernel: audit: type=1106 audit(1747442599.977:1441): pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.977000 audit[4824]: CRED_DISP pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.990385 kernel: audit: type=1104 audit(1747442599.977:1442): pid=4824 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:19.994282 systemd[1]: sshd@9-137.184.231.134:22-147.75.109.163:60498.service: Deactivated successfully. May 17 00:43:19.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.231.134:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:19.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.231.134:22-147.75.109.163:60498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:19.997320 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:43:19.997555 systemd-logind[1177]: Session 10 logged out. Waiting for processes to exit. May 17 00:43:20.000490 systemd-logind[1177]: Removed session 10. May 17 00:43:20.058000 audit[4837]: USER_ACCT pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.059806 sshd[4837]: Accepted publickey for core from 147.75.109.163 port 60512 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:20.060000 audit[4837]: CRED_ACQ pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.061000 audit[4837]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4cfc5100 a2=3 a3=0 items=0 ppid=1 pid=4837 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:20.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:20.063392 sshd[4837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:20.070517 systemd-logind[1177]: New session 11 of user core. May 17 00:43:20.071110 systemd[1]: Started session-11.scope. May 17 00:43:20.077000 audit[4837]: USER_START pid=4837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.080000 audit[4841]: CRED_ACQ pid=4841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.443667 kubelet[1936]: E0517 00:43:20.443476 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:43:20.727532 sshd[4837]: pam_unix(sshd:session): session closed for user core May 17 00:43:20.734000 audit[4837]: USER_END pid=4837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.734000 audit[4837]: CRED_DISP pid=4837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.231.134:22-147.75.109.163:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:20.739582 systemd[1]: Started sshd@11-137.184.231.134:22-147.75.109.163:60516.service. May 17 00:43:20.740467 systemd[1]: sshd@10-137.184.231.134:22-147.75.109.163:60512.service: Deactivated successfully. May 17 00:43:20.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.231.134:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:20.743974 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:43:20.750335 systemd-logind[1177]: Session 11 logged out. Waiting for processes to exit. May 17 00:43:20.752474 systemd-logind[1177]: Removed session 11. May 17 00:43:20.816979 sshd[4849]: Accepted publickey for core from 147.75.109.163 port 60516 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:20.815000 audit[4849]: USER_ACCT pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.822708 sshd[4849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:20.820000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.821000 audit[4849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c381680 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:20.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:20.830829 systemd[1]: Started session-12.scope. May 17 00:43:20.832761 systemd-logind[1177]: New session 12 of user core. May 17 00:43:20.842000 audit[4849]: USER_START pid=4849 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:20.844000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:21.055333 sshd[4849]: pam_unix(sshd:session): session closed for user core May 17 00:43:21.057000 audit[4849]: USER_END pid=4849 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:21.057000 audit[4849]: CRED_DISP pid=4849 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:21.061681 systemd[1]: sshd@11-137.184.231.134:22-147.75.109.163:60516.service: Deactivated successfully. May 17 00:43:21.063285 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:43:21.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.231.134:22-147.75.109.163:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:21.065063 systemd-logind[1177]: Session 12 logged out. Waiting for processes to exit. May 17 00:43:21.066685 systemd-logind[1177]: Removed session 12. May 17 00:43:21.137518 kubelet[1936]: E0517 00:43:21.136914 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:43:24.139893 kubelet[1936]: E0517 00:43:24.139812 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:26.067400 systemd[1]: Started sshd@12-137.184.231.134:22-147.75.109.163:60520.service. May 17 00:43:26.072846 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:43:26.074978 kernel: audit: type=1130 audit(1747442606.066:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.231.134:22-147.75.109.163:60520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:26.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.231.134:22-147.75.109.163:60520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:26.196340 sshd[4883]: Accepted publickey for core from 147.75.109.163 port 60520 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:26.195000 audit[4883]: USER_ACCT pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.201401 kernel: audit: type=1101 audit(1747442606.195:1463): pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.200000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.207220 kernel: audit: type=1103 audit(1747442606.200:1464): pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.207933 sshd[4883]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:26.213292 kernel: audit: type=1006 audit(1747442606.201:1465): pid=4883 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:43:26.201000 audit[4883]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff04aaf350 a2=3 a3=0 items=0 ppid=1 pid=4883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.223098 kernel: audit: type=1300 audit(1747442606.201:1465): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff04aaf350 a2=3 a3=0 items=0 ppid=1 pid=4883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.223243 kernel: audit: type=1327 audit(1747442606.201:1465): proctitle=737368643A20636F7265205B707269765D May 17 00:43:26.201000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:26.225869 systemd-logind[1177]: New session 13 of user core. May 17 00:43:26.226789 systemd[1]: Started session-13.scope. May 17 00:43:26.242614 kernel: audit: type=1105 audit(1747442606.233:1466): pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.233000 audit[4883]: USER_START pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.240000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.247234 kernel: audit: type=1103 audit(1747442606.240:1467): pid=4889 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.801300 sshd[4883]: pam_unix(sshd:session): session closed for user core May 17 00:43:26.804000 audit[4883]: USER_END pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.822245 kernel: audit: type=1106 audit(1747442606.804:1468): pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.822834 systemd-logind[1177]: Session 13 logged out. Waiting for processes to exit. May 17 00:43:26.823275 systemd[1]: sshd@12-137.184.231.134:22-147.75.109.163:60520.service: Deactivated successfully. May 17 00:43:26.824695 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:43:26.827945 systemd-logind[1177]: Removed session 13. May 17 00:43:26.818000 audit[4883]: CRED_DISP pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.837290 kernel: audit: type=1104 audit(1747442606.818:1469): pid=4883 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:26.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.231.134:22-147.75.109.163:60520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:28.542429 systemd[1]: run-containerd-runc-k8s.io-5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb-runc.a1eOKy.mount: Deactivated successfully. May 17 00:43:29.249804 kubelet[1936]: I0517 00:43:29.248582 1936 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:29.551000 audit[4922]: NETFILTER_CFG table=filter:130 family=2 entries=12 op=nft_register_rule pid=4922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.551000 audit[4922]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffcad8f350 a2=0 a3=7fffcad8f33c items=0 ppid=2044 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:29.556000 audit[4922]: NETFILTER_CFG table=nat:131 family=2 entries=34 op=nft_register_chain pid=4922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.556000 audit[4922]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffcad8f350 a2=0 a3=7fffcad8f33c items=0 ppid=2044 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:30.135668 kubelet[1936]: E0517 00:43:30.135619 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:31.811341 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:43:31.811658 kernel: audit: type=1130 audit(1747442611.805:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.231.134:22-147.75.109.163:45828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:31.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.231.134:22-147.75.109.163:45828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:31.806217 systemd[1]: Started sshd@13-137.184.231.134:22-147.75.109.163:45828.service. May 17 00:43:31.886000 audit[4925]: USER_ACCT pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.891118 sshd[4925]: Accepted publickey for core from 147.75.109.163 port 45828 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:31.891932 kernel: audit: type=1101 audit(1747442611.886:1474): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.902923 kernel: audit: type=1103 audit(1747442611.892:1475): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.903095 kernel: audit: type=1006 audit(1747442611.892:1476): pid=4925 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:43:31.903129 kernel: audit: type=1300 audit(1747442611.892:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff35d19b50 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.892000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.905393 kernel: audit: type=1327 audit(1747442611.892:1476): proctitle=737368643A20636F7265205B707269765D May 17 00:43:31.892000 audit[4925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff35d19b50 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:31.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:31.897114 sshd[4925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:31.910356 systemd-logind[1177]: New session 14 of user core. May 17 00:43:31.911353 systemd[1]: Started session-14.scope. May 17 00:43:31.921000 audit[4925]: USER_START pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.929818 kernel: audit: type=1105 audit(1747442611.921:1477): pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.929978 kernel: audit: type=1103 audit(1747442611.923:1478): pid=4927 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:31.923000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:32.308516 sshd[4925]: pam_unix(sshd:session): session closed for user core May 17 00:43:32.308000 audit[4925]: USER_END pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:32.316406 kernel: audit: type=1106 audit(1747442612.308:1479): pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:32.312546 systemd[1]: sshd@13-137.184.231.134:22-147.75.109.163:45828.service: Deactivated successfully. May 17 00:43:32.317282 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:43:32.309000 audit[4925]: CRED_DISP pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:32.321340 kernel: audit: type=1104 audit(1747442612.309:1480): pid=4925 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:32.321566 systemd-logind[1177]: Session 14 logged out. Waiting for processes to exit. May 17 00:43:32.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.231.134:22-147.75.109.163:45828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:32.322991 systemd-logind[1177]: Removed session 14. May 17 00:43:33.173549 env[1189]: time="2025-05-17T00:43:33.173468252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:43:33.415566 env[1189]: time="2025-05-17T00:43:33.415425620Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:33.416514 env[1189]: time="2025-05-17T00:43:33.416437705Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:33.420955 kubelet[1936]: E0517 00:43:33.420841 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:33.422813 kubelet[1936]: E0517 00:43:33.422712 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:33.428899 kubelet[1936]: E0517 00:43:33.428719 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k5xm2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:33.430906 kubelet[1936]: E0517 00:43:33.430832 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:43:35.137350 env[1189]: time="2025-05-17T00:43:35.137252224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:43:35.355796 env[1189]: time="2025-05-17T00:43:35.355696253Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:35.356805 env[1189]: time="2025-05-17T00:43:35.356713372Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:35.357326 kubelet[1936]: E0517 00:43:35.357267 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:35.357910 kubelet[1936]: E0517 00:43:35.357876 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:35.358677 kubelet[1936]: E0517 00:43:35.358615 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9f96105e76194fff987cd18206f07c37,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:35.361608 env[1189]: time="2025-05-17T00:43:35.361529236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:43:35.578232 env[1189]: time="2025-05-17T00:43:35.577952478Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:35.578954 env[1189]: time="2025-05-17T00:43:35.578806320Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:35.579377 kubelet[1936]: E0517 00:43:35.579325 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:35.579544 kubelet[1936]: E0517 00:43:35.579523 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:35.579883 kubelet[1936]: E0517 00:43:35.579825 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qfgnq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54cbff8cc9-7hnjg_calico-system(71e43f43-59e2-4a44-b5eb-200104c5a527): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:35.581273 kubelet[1936]: E0517 00:43:35.581222 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:43:37.322900 systemd[1]: Started sshd@14-137.184.231.134:22-147.75.109.163:45830.service. May 17 00:43:37.329637 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:43:37.329921 kernel: audit: type=1130 audit(1747442617.324:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.231.134:22-147.75.109.163:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:37.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.231.134:22-147.75.109.163:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:37.454000 audit[4944]: USER_ACCT pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.461690 kernel: audit: type=1101 audit(1747442617.454:1483): pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.462136 sshd[4944]: Accepted publickey for core from 147.75.109.163 port 45830 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:37.460000 audit[4944]: CRED_ACQ pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.463522 sshd[4944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:37.467550 kernel: audit: type=1103 audit(1747442617.460:1484): pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.471557 kernel: audit: type=1006 audit(1747442617.461:1485): pid=4944 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:43:37.482658 kernel: audit: type=1300 audit(1747442617.461:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfe13a420 a2=3 a3=0 items=0 ppid=1 pid=4944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.461000 audit[4944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfe13a420 a2=3 a3=0 items=0 ppid=1 pid=4944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.479542 systemd[1]: Started session-15.scope. May 17 00:43:37.481916 systemd-logind[1177]: New session 15 of user core. May 17 00:43:37.461000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:37.489679 kernel: audit: type=1327 audit(1747442617.461:1485): proctitle=737368643A20636F7265205B707269765D May 17 00:43:37.499222 kernel: audit: type=1105 audit(1747442617.493:1486): pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.493000 audit[4944]: USER_START pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.503272 kernel: audit: type=1103 audit(1747442617.498:1487): pid=4946 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:37.498000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:38.125710 sshd[4944]: pam_unix(sshd:session): session closed for user core May 17 00:43:38.127000 audit[4944]: USER_END pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:38.136931 kernel: audit: type=1106 audit(1747442618.127:1488): pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:38.137065 kernel: audit: type=1104 audit(1747442618.127:1489): pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:38.127000 audit[4944]: CRED_DISP pid=4944 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:38.138054 systemd[1]: sshd@14-137.184.231.134:22-147.75.109.163:45830.service: Deactivated successfully. May 17 00:43:38.139217 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:43:38.141302 systemd-logind[1177]: Session 15 logged out. Waiting for processes to exit. May 17 00:43:38.143458 systemd-logind[1177]: Removed session 15. May 17 00:43:38.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.231.134:22-147.75.109.163:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:43.147488 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:43:43.148662 kernel: audit: type=1130 audit(1747442623.141:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.231.134:22-147.75.109.163:41542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:43.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.231.134:22-147.75.109.163:41542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:43.142482 systemd[1]: Started sshd@15-137.184.231.134:22-147.75.109.163:41542.service. May 17 00:43:43.221000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.227214 kernel: audit: type=1101 audit(1747442623.221:1492): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.228286 sshd[4958]: Accepted publickey for core from 147.75.109.163 port 41542 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:43.228000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.236518 kernel: audit: type=1103 audit(1747442623.228:1493): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.236714 kernel: audit: type=1006 audit(1747442623.232:1494): pid=4958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:43:43.232000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe118c7a30 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.242783 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:43.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:43.244402 kernel: audit: type=1300 audit(1747442623.232:1494): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe118c7a30 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:43.244575 kernel: audit: type=1327 audit(1747442623.232:1494): proctitle=737368643A20636F7265205B707269765D May 17 00:43:43.253317 systemd-logind[1177]: New session 16 of user core. May 17 00:43:43.254343 systemd[1]: Started session-16.scope. May 17 00:43:43.261000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.269196 kernel: audit: type=1105 audit(1747442623.261:1495): pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.269686 kernel: audit: type=1103 audit(1747442623.267:1496): pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.267000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.562339 sshd[4958]: pam_unix(sshd:session): session closed for user core May 17 00:43:43.562000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.572244 kernel: audit: type=1106 audit(1747442623.562:1497): pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.572288 systemd-logind[1177]: Session 16 logged out. Waiting for processes to exit. May 17 00:43:43.574934 systemd[1]: sshd@15-137.184.231.134:22-147.75.109.163:41542.service: Deactivated successfully. May 17 00:43:43.576381 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:43:43.562000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.583216 kernel: audit: type=1104 audit(1747442623.562:1498): pid=4958 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:43.584885 systemd-logind[1177]: Removed session 16. May 17 00:43:43.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.231.134:22-147.75.109.163:41542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:45.139385 kubelet[1936]: E0517 00:43:45.138481 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:46.136446 kubelet[1936]: E0517 00:43:46.136398 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:46.138923 kubelet[1936]: E0517 00:43:46.138860 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:43:47.140483 kubelet[1936]: E0517 00:43:47.140434 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:43:48.136233 kubelet[1936]: E0517 00:43:48.136155 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:48.576466 systemd[1]: Started sshd@16-137.184.231.134:22-147.75.109.163:49190.service. May 17 00:43:48.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.231.134:22-147.75.109.163:49190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:48.578612 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:43:48.578710 kernel: audit: type=1130 audit(1747442628.576:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.231.134:22-147.75.109.163:49190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:48.663229 sshd[4972]: Accepted publickey for core from 147.75.109.163 port 49190 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:48.661000 audit[4972]: USER_ACCT pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.675287 kernel: audit: type=1101 audit(1747442628.661:1501): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.675481 kernel: audit: type=1103 audit(1747442628.666:1502): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.675514 kernel: audit: type=1006 audit(1747442628.666:1503): pid=4972 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:43:48.666000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.672836 sshd[4972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:48.666000 audit[4972]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27f01040 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.679352 kernel: audit: type=1300 audit(1747442628.666:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27f01040 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:48.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:48.681024 kernel: audit: type=1327 audit(1747442628.666:1503): proctitle=737368643A20636F7265205B707269765D May 17 00:43:48.687880 systemd[1]: Started session-17.scope. May 17 00:43:48.690148 systemd-logind[1177]: New session 17 of user core. May 17 00:43:48.696000 audit[4972]: USER_START pid=4972 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.705273 kernel: audit: type=1105 audit(1747442628.696:1504): pid=4972 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.704000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:48.710280 kernel: audit: type=1103 audit(1747442628.704:1505): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.173577 sshd[4972]: pam_unix(sshd:session): session closed for user core May 17 00:43:49.177224 systemd[1]: Started sshd@17-137.184.231.134:22-147.75.109.163:49204.service. May 17 00:43:49.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.231.134:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:49.181221 kernel: audit: type=1130 audit(1747442629.176:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.231.134:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:49.183000 audit[4972]: USER_END pid=4972 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.191812 kernel: audit: type=1106 audit(1747442629.183:1507): pid=4972 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.192453 systemd[1]: sshd@16-137.184.231.134:22-147.75.109.163:49190.service: Deactivated successfully. May 17 00:43:49.188000 audit[4972]: CRED_DISP pid=4972 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.231.134:22-147.75.109.163:49190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:49.194327 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:43:49.197873 systemd-logind[1177]: Session 17 logged out. Waiting for processes to exit. May 17 00:43:49.200953 systemd-logind[1177]: Removed session 17. May 17 00:43:49.271000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.275126 sshd[4983]: Accepted publickey for core from 147.75.109.163 port 49204 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:49.274000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.275000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68aaf9d0 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:49.275000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:49.279540 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:49.287277 systemd[1]: Started session-18.scope. May 17 00:43:49.288125 systemd-logind[1177]: New session 18 of user core. May 17 00:43:49.300000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.303000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.381724 systemd[1]: run-containerd-runc-k8s.io-5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb-runc.qKmkWM.mount: Deactivated successfully. May 17 00:43:49.822408 sshd[4983]: pam_unix(sshd:session): session closed for user core May 17 00:43:49.828000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.829000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.231.134:22-147.75.109.163:49220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:49.831418 systemd[1]: Started sshd@18-137.184.231.134:22-147.75.109.163:49220.service. May 17 00:43:49.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.231.134:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:49.833967 systemd[1]: sshd@17-137.184.231.134:22-147.75.109.163:49204.service: Deactivated successfully. May 17 00:43:49.838812 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:43:49.841132 systemd-logind[1177]: Session 18 logged out. Waiting for processes to exit. May 17 00:43:49.844003 systemd-logind[1177]: Removed session 18. May 17 00:43:49.910000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.912395 sshd[5012]: Accepted publickey for core from 147.75.109.163 port 49220 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:49.912000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.913000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2c75add0 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:49.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:49.915804 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:49.924411 systemd[1]: Started session-19.scope. May 17 00:43:49.924823 systemd-logind[1177]: New session 19 of user core. May 17 00:43:49.930000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:49.932000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.459971 sshd[5012]: pam_unix(sshd:session): session closed for user core May 17 00:43:51.465645 systemd[1]: Started sshd@19-137.184.231.134:22-147.75.109.163:49226.service. May 17 00:43:51.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.231.134:22-147.75.109.163:49226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:51.467000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.468000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.231.134:22-147.75.109.163:49220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:51.484623 systemd[1]: sshd@18-137.184.231.134:22-147.75.109.163:49220.service: Deactivated successfully. May 17 00:43:51.486039 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:43:51.491069 systemd-logind[1177]: Session 19 logged out. Waiting for processes to exit. May 17 00:43:51.492521 systemd-logind[1177]: Removed session 19. May 17 00:43:51.550811 sshd[5025]: Accepted publickey for core from 147.75.109.163 port 49226 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:51.549000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.551000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.551000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ecbfcc0 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:51.554391 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:51.562535 systemd-logind[1177]: New session 20 of user core. May 17 00:43:51.563757 systemd[1]: Started session-20.scope. May 17 00:43:51.571000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.574000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:51.582000 audit[5029]: NETFILTER_CFG table=filter:132 family=2 entries=24 op=nft_register_rule pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.582000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fffd008ec70 a2=0 a3=7fffd008ec5c items=0 ppid=2044 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.591000 audit[5029]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.591000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd008ec70 a2=0 a3=0 items=0 ppid=2044 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.684000 audit[5033]: NETFILTER_CFG table=filter:134 family=2 entries=36 op=nft_register_rule pid=5033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.684000 audit[5033]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc941af970 a2=0 a3=7ffc941af95c items=0 ppid=2044 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.699000 audit[5033]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=5033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.699000 audit[5033]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc941af970 a2=0 a3=0 items=0 ppid=2044 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:52.578604 sshd[5025]: pam_unix(sshd:session): session closed for user core May 17 00:43:52.583000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.583000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.231.134:22-147.75.109.163:49242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:52.589318 systemd[1]: Started sshd@20-137.184.231.134:22-147.75.109.163:49242.service. May 17 00:43:52.590234 systemd[1]: sshd@19-137.184.231.134:22-147.75.109.163:49226.service: Deactivated successfully. May 17 00:43:52.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.231.134:22-147.75.109.163:49226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:52.594088 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:43:52.599353 systemd-logind[1177]: Session 20 logged out. Waiting for processes to exit. May 17 00:43:52.600902 systemd-logind[1177]: Removed session 20. May 17 00:43:52.681156 sshd[5039]: Accepted publickey for core from 147.75.109.163 port 49242 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:52.679000 audit[5039]: USER_ACCT pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.684186 sshd[5039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:52.682000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.682000 audit[5039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff754be0f0 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.682000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:52.690475 systemd[1]: Started session-21.scope. May 17 00:43:52.691453 systemd-logind[1177]: New session 21 of user core. May 17 00:43:52.698000 audit[5039]: USER_START pid=5039 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.700000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.940845 sshd[5039]: pam_unix(sshd:session): session closed for user core May 17 00:43:52.943000 audit[5039]: USER_END pid=5039 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.943000 audit[5039]: CRED_DISP pid=5039 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:52.946556 systemd[1]: sshd@20-137.184.231.134:22-147.75.109.163:49242.service: Deactivated successfully. May 17 00:43:52.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.231.134:22-147.75.109.163:49242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:52.947546 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:43:52.948720 systemd-logind[1177]: Session 21 logged out. Waiting for processes to exit. May 17 00:43:52.949881 systemd-logind[1177]: Removed session 21. May 17 00:43:57.952574 systemd[1]: Started sshd@21-137.184.231.134:22-147.75.109.163:49248.service. May 17 00:43:57.955388 kernel: kauditd_printk_skb: 57 callbacks suppressed May 17 00:43:57.960600 kernel: audit: type=1130 audit(1747442637.951:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.231.134:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:57.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.231.134:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:58.094000 audit[5071]: USER_ACCT pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.099664 sshd[5071]: Accepted publickey for core from 147.75.109.163 port 49248 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:58.100281 kernel: audit: type=1101 audit(1747442638.094:1550): pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.100000 audit[5071]: CRED_ACQ pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.116763 kernel: audit: type=1103 audit(1747442638.100:1551): pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.116967 kernel: audit: type=1006 audit(1747442638.101:1552): pid=5071 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:43:58.117892 sshd[5071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:58.125389 systemd-logind[1177]: New session 22 of user core. May 17 00:43:58.125734 systemd[1]: Started session-22.scope. May 17 00:43:58.101000 audit[5071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff554c13f0 a2=3 a3=0 items=0 ppid=1 pid=5071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.136074 kernel: audit: type=1300 audit(1747442638.101:1552): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff554c13f0 a2=3 a3=0 items=0 ppid=1 pid=5071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:58.143212 kernel: audit: type=1327 audit(1747442638.101:1552): proctitle=737368643A20636F7265205B707269765D May 17 00:43:58.140000 audit[5071]: USER_START pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.148538 kernel: audit: type=1105 audit(1747442638.140:1553): pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.143000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.154193 kernel: audit: type=1103 audit(1747442638.143:1554): pid=5073 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.596816 systemd[1]: run-containerd-runc-k8s.io-5da8e64698a8c1994313138c3016b0e7527bebb08580cb74bbc975e73b86fccb-runc.TV2PDW.mount: Deactivated successfully. May 17 00:43:58.657935 sshd[5071]: pam_unix(sshd:session): session closed for user core May 17 00:43:58.658000 audit[5071]: USER_END pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.662768 systemd[1]: sshd@21-137.184.231.134:22-147.75.109.163:49248.service: Deactivated successfully. May 17 00:43:58.664167 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:43:58.666386 kernel: audit: type=1106 audit(1747442638.658:1555): pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.658000 audit[5071]: CRED_DISP pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.672609 kernel: audit: type=1104 audit(1747442638.658:1556): pid=5071 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:58.671666 systemd-logind[1177]: Session 22 logged out. Waiting for processes to exit. May 17 00:43:58.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.231.134:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:58.674285 systemd-logind[1177]: Removed session 22. May 17 00:43:59.443000 audit[5102]: NETFILTER_CFG table=filter:136 family=2 entries=24 op=nft_register_rule pid=5102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:59.443000 audit[5102]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff2512d990 a2=0 a3=7fff2512d97c items=0 ppid=2044 pid=5102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:59.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:59.450000 audit[5102]: NETFILTER_CFG table=nat:137 family=2 entries=106 op=nft_register_chain pid=5102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:59.450000 audit[5102]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff2512d990 a2=0 a3=7fff2512d97c items=0 ppid=2044 pid=5102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:59.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:01.527404 kubelet[1936]: E0517 00:44:01.519083 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:44:01.559067 kubelet[1936]: E0517 00:44:01.558941 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:44:03.668497 systemd[1]: Started sshd@22-137.184.231.134:22-147.75.109.163:40916.service. May 17 00:44:03.671049 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:44:03.671214 kernel: audit: type=1130 audit(1747442643.667:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.231.134:22-147.75.109.163:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:03.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.231.134:22-147.75.109.163:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:03.829000 audit[5106]: USER_ACCT pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.838608 kernel: audit: type=1101 audit(1747442643.829:1561): pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.838749 sshd[5106]: Accepted publickey for core from 147.75.109.163 port 40916 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:03.851301 kernel: audit: type=1103 audit(1747442643.837:1562): pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.851436 kernel: audit: type=1006 audit(1747442643.837:1563): pid=5106 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:44:03.853430 kernel: audit: type=1300 audit(1747442643.837:1563): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44c22110 a2=3 a3=0 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.853553 kernel: audit: type=1327 audit(1747442643.837:1563): proctitle=737368643A20636F7265205B707269765D May 17 00:44:03.837000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.837000 audit[5106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44c22110 a2=3 a3=0 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:03.853894 sshd[5106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:03.873107 systemd-logind[1177]: New session 23 of user core. May 17 00:44:03.875600 systemd[1]: Started session-23.scope. May 17 00:44:03.885000 audit[5106]: USER_START pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.893687 kernel: audit: type=1105 audit(1747442643.885:1564): pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.896719 kernel: audit: type=1103 audit(1747442643.891:1565): pid=5108 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:03.891000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:04.730471 sshd[5106]: pam_unix(sshd:session): session closed for user core May 17 00:44:04.730000 audit[5106]: USER_END pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:04.737207 kernel: audit: type=1106 audit(1747442644.730:1566): pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:04.739695 kernel: audit: type=1104 audit(1747442644.731:1567): pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:04.731000 audit[5106]: CRED_DISP pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:04.739042 systemd[1]: sshd@22-137.184.231.134:22-147.75.109.163:40916.service: Deactivated successfully. May 17 00:44:04.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.231.134:22-147.75.109.163:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:04.745393 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:44:04.746862 systemd-logind[1177]: Session 23 logged out. Waiting for processes to exit. May 17 00:44:04.748159 systemd-logind[1177]: Removed session 23. May 17 00:44:05.126000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:05.126000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00218af60 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:05.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:05.126000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:05.126000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002083920 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:05.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.252000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.252000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0066cab60 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:06.256000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524340 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.256000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c000bba8d0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:06.256000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.256000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c000bbaa50 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:06.256000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524338 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.256000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c000bbab10 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:06.271000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.271000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c007dd8d80 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:06.274000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.274000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00a84a8a0 a2=fc6 a3=0 items=0 ppid=1653 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c688 key=(null) May 17 00:44:06.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E3233312E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 17 00:44:07.910000 audit[4289]: AVC avc: denied { watch } for pid=4289 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_40.934682368/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c144,c831 tclass=file permissive=0 May 17 00:44:07.910000 audit[4289]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001c089a0 a2=fc6 a3=0 items=0 ppid=3660 pid=4289 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c831 key=(null) May 17 00:44:07.910000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:08.061000 audit[4325]: AVC avc: denied { watch } for pid=4325 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_40.2927453150/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c874,c1004 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c874,c1004 tclass=file permissive=0 May 17 00:44:08.061000 audit[4325]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0022685c0 a2=fc6 a3=0 items=0 ppid=4075 pid=4325 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c874,c1004 key=(null) May 17 00:44:08.061000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:09.742527 systemd[1]: Started sshd@23-137.184.231.134:22-147.75.109.163:43228.service. May 17 00:44:09.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.231.134:22-147.75.109.163:43228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:09.747981 kernel: kauditd_printk_skb: 31 callbacks suppressed May 17 00:44:09.748105 kernel: audit: type=1130 audit(1747442649.742:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.231.134:22-147.75.109.163:43228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:09.872712 sshd[5120]: Accepted publickey for core from 147.75.109.163 port 43228 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:09.871000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.876216 kernel: audit: type=1101 audit(1747442649.871:1580): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.875000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.880228 kernel: audit: type=1103 audit(1747442649.875:1581): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.883218 kernel: audit: type=1006 audit(1747442649.875:1582): pid=5120 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:44:09.883621 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:09.891926 systemd[1]: Started session-24.scope. May 17 00:44:09.875000 audit[5120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4dad2aa0 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.897209 kernel: audit: type=1300 audit(1747442649.875:1582): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4dad2aa0 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:09.898304 systemd-logind[1177]: New session 24 of user core. May 17 00:44:09.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:09.903279 kernel: audit: type=1327 audit(1747442649.875:1582): proctitle=737368643A20636F7265205B707269765D May 17 00:44:09.906000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.912295 kernel: audit: type=1105 audit(1747442649.906:1583): pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.912000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:09.919230 kernel: audit: type=1103 audit(1747442649.912:1584): pid=5122 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:10.382130 sshd[5120]: pam_unix(sshd:session): session closed for user core May 17 00:44:10.382000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:10.389321 kernel: audit: type=1106 audit(1747442650.382:1585): pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:10.383000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:10.393238 kernel: audit: type=1104 audit(1747442650.383:1586): pid=5120 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:10.397778 systemd[1]: sshd@23-137.184.231.134:22-147.75.109.163:43228.service: Deactivated successfully. May 17 00:44:10.399762 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:44:10.400159 systemd-logind[1177]: Session 24 logged out. Waiting for processes to exit. May 17 00:44:10.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.231.134:22-147.75.109.163:43228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:10.402639 systemd-logind[1177]: Removed session 24. May 17 00:44:11.700000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:11.700000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0003f5da0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:11.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:11.701000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:11.701000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0003f5ea0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:11.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:11.713000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:11.713000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002110320 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:11.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:11.713000 audit[1815]: AVC avc: denied { watch } for pid=1815 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:11.713000 audit[1815]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021106a0 a2=fc6 a3=0 items=0 ppid=1652 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c642 key=(null) May 17 00:44:11.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:13.163914 kubelet[1936]: E0517 00:44:13.163859 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:13.171974 kubelet[1936]: E0517 00:44:13.165827 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54cbff8cc9-7hnjg" podUID="71e43f43-59e2-4a44-b5eb-200104c5a527" May 17 00:44:15.139227 env[1189]: time="2025-05-17T00:44:15.139155972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:44:15.367546 env[1189]: time="2025-05-17T00:44:15.367462004Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:15.368803 env[1189]: time="2025-05-17T00:44:15.368715771Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:15.373958 kubelet[1936]: E0517 00:44:15.370887 1936 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:15.377718 kubelet[1936]: E0517 00:44:15.377650 1936 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:15.384630 kubelet[1936]: E0517 00:44:15.384541 1936 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k5xm2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-9rdv2_calico-system(69df8fb6-fba5-46ca-8889-9f55cf9bb0d5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:44:15.389568 kubelet[1936]: E0517 00:44:15.389403 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-9rdv2" podUID="69df8fb6-fba5-46ca-8889-9f55cf9bb0d5" May 17 00:44:15.394227 systemd[1]: Started sshd@24-137.184.231.134:22-147.75.109.163:43236.service. May 17 00:44:15.398374 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:44:15.398569 kernel: audit: type=1130 audit(1747442655.393:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.231.134:22-147.75.109.163:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:15.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.231.134:22-147.75.109.163:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:15.484000 audit[5140]: USER_ACCT pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.486537 sshd[5140]: Accepted publickey for core from 147.75.109.163 port 43236 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:15.488000 audit[5140]: CRED_ACQ pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.490990 sshd[5140]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:15.493820 kernel: audit: type=1101 audit(1747442655.484:1593): pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.493942 kernel: audit: type=1103 audit(1747442655.488:1594): pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.493966 kernel: audit: type=1006 audit(1747442655.488:1595): pid=5140 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:44:15.488000 audit[5140]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8632330 a2=3 a3=0 items=0 ppid=1 pid=5140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:15.502311 kernel: audit: type=1300 audit(1747442655.488:1595): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8632330 a2=3 a3=0 items=0 ppid=1 pid=5140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:15.502072 systemd-logind[1177]: New session 25 of user core. May 17 00:44:15.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:15.503041 systemd[1]: Started session-25.scope. May 17 00:44:15.505280 kernel: audit: type=1327 audit(1747442655.488:1595): proctitle=737368643A20636F7265205B707269765D May 17 00:44:15.513000 audit[5140]: USER_START pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.513000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.522099 kernel: audit: type=1105 audit(1747442655.513:1596): pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.522373 kernel: audit: type=1103 audit(1747442655.513:1597): pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.924643 sshd[5140]: pam_unix(sshd:session): session closed for user core May 17 00:44:15.927000 audit[5140]: USER_END pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.934248 kernel: audit: type=1106 audit(1747442655.927:1598): pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.932000 audit[5140]: CRED_DISP pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.935800 systemd[1]: sshd@24-137.184.231.134:22-147.75.109.163:43236.service: Deactivated successfully. May 17 00:44:15.936860 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:44:15.938766 systemd-logind[1177]: Session 25 logged out. Waiting for processes to exit. May 17 00:44:15.939255 kernel: audit: type=1104 audit(1747442655.932:1599): pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:15.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.231.134:22-147.75.109.163:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:15.940593 systemd-logind[1177]: Removed session 25. May 17 00:44:18.136589 kubelet[1936]: E0517 00:44:18.136540 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:44:20.926630 systemd[1]: Started sshd@25-137.184.231.134:22-147.75.109.163:46562.service. May 17 00:44:20.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.231.134:22-147.75.109.163:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:20.930788 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:44:20.930873 kernel: audit: type=1130 audit(1747442660.928:1601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.231.134:22-147.75.109.163:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:21.028000 audit[5156]: USER_ACCT pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.030313 sshd[5156]: Accepted publickey for core from 147.75.109.163 port 46562 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:44:21.032000 audit[5156]: CRED_ACQ pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.037118 kernel: audit: type=1101 audit(1747442661.028:1602): pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.037320 kernel: audit: type=1103 audit(1747442661.032:1603): pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.039696 sshd[5156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:21.032000 audit[5156]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8420abb0 a2=3 a3=0 items=0 ppid=1 pid=5156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:21.043175 kernel: audit: type=1006 audit(1747442661.032:1604): pid=5156 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:44:21.043351 kernel: audit: type=1300 audit(1747442661.032:1604): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8420abb0 a2=3 a3=0 items=0 ppid=1 pid=5156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:21.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:21.045202 kernel: audit: type=1327 audit(1747442661.032:1604): proctitle=737368643A20636F7265205B707269765D May 17 00:44:21.053536 systemd-logind[1177]: New session 26 of user core. May 17 00:44:21.055086 systemd[1]: Started session-26.scope. May 17 00:44:21.060000 audit[5156]: USER_START pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.062000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.069312 kernel: audit: type=1105 audit(1747442661.060:1605): pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.069474 kernel: audit: type=1103 audit(1747442661.062:1606): pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.485320 sshd[5156]: pam_unix(sshd:session): session closed for user core May 17 00:44:21.491000 audit[5156]: USER_END pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.497566 systemd[1]: sshd@25-137.184.231.134:22-147.75.109.163:46562.service: Deactivated successfully. May 17 00:44:21.498843 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:44:21.506214 kernel: audit: type=1106 audit(1747442661.491:1607): pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.507166 systemd-logind[1177]: Session 26 logged out. Waiting for processes to exit. May 17 00:44:21.508621 systemd-logind[1177]: Removed session 26. May 17 00:44:21.491000 audit[5156]: CRED_DISP pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.519243 kernel: audit: type=1104 audit(1747442661.491:1608): pid=5156 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:21.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.231.134:22-147.75.109.163:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'